Feb 9 19:31:48.025553 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:31:48.025601 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:31:48.025631 kernel: BIOS-provided physical RAM map: Feb 9 19:31:48.025649 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 19:31:48.025665 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 19:31:48.025682 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 19:31:48.025702 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Feb 9 19:31:48.025719 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Feb 9 19:31:48.030803 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 9 19:31:48.030821 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 19:31:48.030834 kernel: NX (Execute Disable) protection: active Feb 9 19:31:48.030846 kernel: SMBIOS 2.8 present. Feb 9 19:31:48.030859 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 9 19:31:48.030872 kernel: Hypervisor detected: KVM Feb 9 19:31:48.030887 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:31:48.030906 kernel: kvm-clock: cpu 0, msr 64faa001, primary cpu clock Feb 9 19:31:48.030920 kernel: kvm-clock: using sched offset of 6146125405 cycles Feb 9 19:31:48.030934 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:31:48.030948 kernel: tsc: Detected 1996.249 MHz processor Feb 9 19:31:48.030963 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:31:48.030977 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:31:48.030991 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Feb 9 19:31:48.031005 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:31:48.031022 kernel: ACPI: Early table checksum verification disabled Feb 9 19:31:48.031036 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Feb 9 19:31:48.031049 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:31:48.031063 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:31:48.031077 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:31:48.031090 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 9 19:31:48.031103 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:31:48.031117 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:31:48.031131 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Feb 9 19:31:48.031147 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Feb 9 19:31:48.031160 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 9 19:31:48.031174 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Feb 9 19:31:48.031187 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Feb 9 19:31:48.031200 kernel: No NUMA configuration found Feb 9 19:31:48.031213 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Feb 9 19:31:48.031227 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Feb 9 19:31:48.031241 kernel: Zone ranges: Feb 9 19:31:48.031262 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:31:48.031277 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Feb 9 19:31:48.031291 kernel: Normal empty Feb 9 19:31:48.031305 kernel: Movable zone start for each node Feb 9 19:31:48.031319 kernel: Early memory node ranges Feb 9 19:31:48.031333 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 19:31:48.031350 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Feb 9 19:31:48.031364 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Feb 9 19:31:48.031378 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:31:48.031392 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 19:31:48.031406 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Feb 9 19:31:48.031420 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 9 19:31:48.031434 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:31:48.031448 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:31:48.031462 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 19:31:48.031479 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:31:48.031494 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:31:48.031508 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:31:48.031522 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:31:48.031536 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:31:48.031550 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:31:48.031564 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 9 19:31:48.031578 kernel: Booting paravirtualized kernel on KVM Feb 9 19:31:48.031593 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:31:48.031608 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:31:48.031625 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:31:48.031639 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:31:48.031653 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:31:48.031667 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 9 19:31:48.031681 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 9 19:31:48.031695 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Feb 9 19:31:48.031709 kernel: Policy zone: DMA32 Feb 9 19:31:48.031725 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:31:48.031766 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:31:48.031780 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:31:48.031795 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:31:48.031809 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:31:48.031824 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 9 19:31:48.031839 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:31:48.031853 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:31:48.031866 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:31:48.031884 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:31:48.031899 kernel: rcu: RCU event tracing is enabled. Feb 9 19:31:48.031914 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:31:48.031928 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:31:48.031942 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:31:48.031957 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:31:48.031971 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:31:48.031985 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:31:48.031999 kernel: Console: colour VGA+ 80x25 Feb 9 19:31:48.032016 kernel: printk: console [tty0] enabled Feb 9 19:31:48.032030 kernel: printk: console [ttyS0] enabled Feb 9 19:31:48.032044 kernel: ACPI: Core revision 20210730 Feb 9 19:31:48.032058 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:31:48.032073 kernel: x2apic enabled Feb 9 19:31:48.032087 kernel: Switched APIC routing to physical x2apic. Feb 9 19:31:48.032101 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 19:31:48.032115 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 19:31:48.032129 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Feb 9 19:31:48.032143 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 9 19:31:48.032161 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 9 19:31:48.032176 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:31:48.032190 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:31:48.032204 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:31:48.032219 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:31:48.032233 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:31:48.032247 kernel: x86/fpu: x87 FPU will use FXSAVE Feb 9 19:31:48.032261 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:31:48.032275 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:31:48.032291 kernel: LSM: Security Framework initializing Feb 9 19:31:48.032305 kernel: SELinux: Initializing. Feb 9 19:31:48.032319 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:31:48.032333 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:31:48.032348 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Feb 9 19:31:48.032362 kernel: Performance Events: AMD PMU driver. Feb 9 19:31:48.032376 kernel: ... version: 0 Feb 9 19:31:48.032390 kernel: ... bit width: 48 Feb 9 19:31:48.032404 kernel: ... generic registers: 4 Feb 9 19:31:48.032435 kernel: ... value mask: 0000ffffffffffff Feb 9 19:31:48.032450 kernel: ... max period: 00007fffffffffff Feb 9 19:31:48.032467 kernel: ... fixed-purpose events: 0 Feb 9 19:31:48.032481 kernel: ... event mask: 000000000000000f Feb 9 19:31:48.032496 kernel: signal: max sigframe size: 1440 Feb 9 19:31:48.032510 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:31:48.032525 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:31:48.032539 kernel: x86: Booting SMP configuration: Feb 9 19:31:48.032557 kernel: .... node #0, CPUs: #1 Feb 9 19:31:48.032572 kernel: kvm-clock: cpu 1, msr 64faa041, secondary cpu clock Feb 9 19:31:48.032587 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 9 19:31:48.032601 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:31:48.032616 kernel: smpboot: Max logical packages: 2 Feb 9 19:31:48.032631 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Feb 9 19:31:48.032646 kernel: devtmpfs: initialized Feb 9 19:31:48.032660 kernel: x86/mm: Memory block size: 128MB Feb 9 19:31:48.032675 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:31:48.032694 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:31:48.032708 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:31:48.032723 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:31:48.032757 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:31:48.032772 kernel: audit: type=2000 audit(1707507107.406:1): state=initialized audit_enabled=0 res=1 Feb 9 19:31:48.032786 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:31:48.032801 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:31:48.032816 kernel: cpuidle: using governor menu Feb 9 19:31:48.032830 kernel: ACPI: bus type PCI registered Feb 9 19:31:48.032848 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:31:48.032863 kernel: dca service started, version 1.12.1 Feb 9 19:31:48.032878 kernel: PCI: Using configuration type 1 for base access Feb 9 19:31:48.032893 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:31:48.032908 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:31:48.032922 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:31:48.032937 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:31:48.032952 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:31:48.032966 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:31:48.032984 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:31:48.032999 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:31:48.033014 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:31:48.033029 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:31:48.033043 kernel: ACPI: Interpreter enabled Feb 9 19:31:48.033058 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:31:48.033073 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:31:48.033088 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:31:48.033102 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 19:31:48.033122 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:31:48.033440 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:31:48.033602 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:31:48.033626 kernel: acpiphp: Slot [3] registered Feb 9 19:31:48.033641 kernel: acpiphp: Slot [4] registered Feb 9 19:31:48.033656 kernel: acpiphp: Slot [5] registered Feb 9 19:31:48.033671 kernel: acpiphp: Slot [6] registered Feb 9 19:31:48.033690 kernel: acpiphp: Slot [7] registered Feb 9 19:31:48.033705 kernel: acpiphp: Slot [8] registered Feb 9 19:31:48.033720 kernel: acpiphp: Slot [9] registered Feb 9 19:31:48.033788 kernel: acpiphp: Slot [10] registered Feb 9 19:31:48.033804 kernel: acpiphp: Slot [11] registered Feb 9 19:31:48.033818 kernel: acpiphp: Slot [12] registered Feb 9 19:31:48.033833 kernel: acpiphp: Slot [13] registered Feb 9 19:31:48.033848 kernel: acpiphp: Slot [14] registered Feb 9 19:31:48.033862 kernel: acpiphp: Slot [15] registered Feb 9 19:31:48.033877 kernel: acpiphp: Slot [16] registered Feb 9 19:31:48.033915 kernel: acpiphp: Slot [17] registered Feb 9 19:31:48.033930 kernel: acpiphp: Slot [18] registered Feb 9 19:31:48.033944 kernel: acpiphp: Slot [19] registered Feb 9 19:31:48.033959 kernel: acpiphp: Slot [20] registered Feb 9 19:31:48.033973 kernel: acpiphp: Slot [21] registered Feb 9 19:31:48.033988 kernel: acpiphp: Slot [22] registered Feb 9 19:31:48.034002 kernel: acpiphp: Slot [23] registered Feb 9 19:31:48.034017 kernel: acpiphp: Slot [24] registered Feb 9 19:31:48.034031 kernel: acpiphp: Slot [25] registered Feb 9 19:31:48.034049 kernel: acpiphp: Slot [26] registered Feb 9 19:31:48.034063 kernel: acpiphp: Slot [27] registered Feb 9 19:31:48.034077 kernel: acpiphp: Slot [28] registered Feb 9 19:31:48.034092 kernel: acpiphp: Slot [29] registered Feb 9 19:31:48.034107 kernel: acpiphp: Slot [30] registered Feb 9 19:31:48.034121 kernel: acpiphp: Slot [31] registered Feb 9 19:31:48.034136 kernel: PCI host bridge to bus 0000:00 Feb 9 19:31:48.034311 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:31:48.034450 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:31:48.034594 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:31:48.034718 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 19:31:48.034820 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 9 19:31:48.034902 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:31:48.034999 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:31:48.035090 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 19:31:48.035187 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 19:31:48.035270 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Feb 9 19:31:48.035352 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 19:31:48.035436 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 19:31:48.035518 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 19:31:48.035610 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 19:31:48.039759 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:31:48.039866 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 9 19:31:48.039960 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 9 19:31:48.040105 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 9 19:31:48.040194 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 9 19:31:48.040286 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 9 19:31:48.040371 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Feb 9 19:31:48.040460 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Feb 9 19:31:48.040553 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 19:31:48.040676 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:31:48.040793 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Feb 9 19:31:48.040878 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Feb 9 19:31:48.040957 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 9 19:31:48.041039 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Feb 9 19:31:48.041132 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 19:31:48.041216 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 19:31:48.041298 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Feb 9 19:31:48.041380 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 9 19:31:48.041468 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Feb 9 19:31:48.041551 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Feb 9 19:31:48.041653 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 9 19:31:48.041799 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:31:48.041897 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Feb 9 19:31:48.041984 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 9 19:31:48.041997 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:31:48.042006 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:31:48.042015 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:31:48.042023 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:31:48.042032 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:31:48.042045 kernel: iommu: Default domain type: Translated Feb 9 19:31:48.042054 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:31:48.042139 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 19:31:48.042225 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 19:31:48.042311 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 19:31:48.042323 kernel: vgaarb: loaded Feb 9 19:31:48.042332 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:31:48.042341 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:31:48.042350 kernel: PTP clock support registered Feb 9 19:31:48.042363 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:31:48.042371 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:31:48.042380 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 19:31:48.042388 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Feb 9 19:31:48.042396 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:31:48.042405 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:31:48.042413 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:31:48.042422 kernel: pnp: PnP ACPI init Feb 9 19:31:48.042512 kernel: pnp 00:03: [dma 2] Feb 9 19:31:48.042529 kernel: pnp: PnP ACPI: found 5 devices Feb 9 19:31:48.042538 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:31:48.042547 kernel: NET: Registered PF_INET protocol family Feb 9 19:31:48.042555 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:31:48.042564 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 19:31:48.042573 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:31:48.042581 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:31:48.042590 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 19:31:48.042601 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 19:31:48.042609 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:31:48.042618 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:31:48.042626 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:31:48.042635 kernel: NET: Registered PF_XDP protocol family Feb 9 19:31:48.042715 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:31:48.042812 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:31:48.042883 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:31:48.042953 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 19:31:48.043028 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 9 19:31:48.043110 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 19:31:48.043192 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:31:48.043272 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 19:31:48.043284 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:31:48.043292 kernel: Initialise system trusted keyrings Feb 9 19:31:48.043301 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 19:31:48.043312 kernel: Key type asymmetric registered Feb 9 19:31:48.043320 kernel: Asymmetric key parser 'x509' registered Feb 9 19:31:48.043328 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:31:48.043336 kernel: io scheduler mq-deadline registered Feb 9 19:31:48.043344 kernel: io scheduler kyber registered Feb 9 19:31:48.043352 kernel: io scheduler bfq registered Feb 9 19:31:48.043360 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:31:48.043368 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 9 19:31:48.043376 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:31:48.043384 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 19:31:48.043394 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:31:48.043402 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:31:48.043410 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:31:48.043418 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:31:48.043426 kernel: random: crng init done Feb 9 19:31:48.043434 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:31:48.043442 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:31:48.043450 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:31:48.043530 kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 9 19:31:48.043611 kernel: rtc_cmos 00:04: registered as rtc0 Feb 9 19:31:48.043685 kernel: rtc_cmos 00:04: setting system clock to 2024-02-09T19:31:47 UTC (1707507107) Feb 9 19:31:48.043777 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 9 19:31:48.043790 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:31:48.043798 kernel: Segment Routing with IPv6 Feb 9 19:31:48.043806 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:31:48.043814 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:31:48.043822 kernel: Key type dns_resolver registered Feb 9 19:31:48.043832 kernel: IPI shorthand broadcast: enabled Feb 9 19:31:48.043840 kernel: sched_clock: Marking stable (682647377, 119973077)->(838423904, -35803450) Feb 9 19:31:48.043848 kernel: registered taskstats version 1 Feb 9 19:31:48.043856 kernel: Loading compiled-in X.509 certificates Feb 9 19:31:48.043865 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:31:48.043873 kernel: Key type .fscrypt registered Feb 9 19:31:48.043881 kernel: Key type fscrypt-provisioning registered Feb 9 19:31:48.043889 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:31:48.043899 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:31:48.043906 kernel: ima: No architecture policies found Feb 9 19:31:48.043914 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:31:48.043922 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:31:48.043930 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:31:48.043938 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:31:48.043946 kernel: Run /init as init process Feb 9 19:31:48.043954 kernel: with arguments: Feb 9 19:31:48.043961 kernel: /init Feb 9 19:31:48.043971 kernel: with environment: Feb 9 19:31:48.043979 kernel: HOME=/ Feb 9 19:31:48.043986 kernel: TERM=linux Feb 9 19:31:48.043994 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:31:48.044005 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:31:48.044016 systemd[1]: Detected virtualization kvm. Feb 9 19:31:48.044024 systemd[1]: Detected architecture x86-64. Feb 9 19:31:48.044033 systemd[1]: Running in initrd. Feb 9 19:31:48.044044 systemd[1]: No hostname configured, using default hostname. Feb 9 19:31:48.044053 systemd[1]: Hostname set to . Feb 9 19:31:48.044062 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:31:48.044071 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:31:48.044079 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:31:48.044088 systemd[1]: Reached target cryptsetup.target. Feb 9 19:31:48.044096 systemd[1]: Reached target paths.target. Feb 9 19:31:48.044104 systemd[1]: Reached target slices.target. Feb 9 19:31:48.044115 systemd[1]: Reached target swap.target. Feb 9 19:31:48.044124 systemd[1]: Reached target timers.target. Feb 9 19:31:48.044133 systemd[1]: Listening on iscsid.socket. Feb 9 19:31:48.044141 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:31:48.044150 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:31:48.044158 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:31:48.044167 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:31:48.044177 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:31:48.044186 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:31:48.044195 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:31:48.044203 systemd[1]: Reached target sockets.target. Feb 9 19:31:48.044212 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:31:48.044232 systemd[1]: Finished network-cleanup.service. Feb 9 19:31:48.044242 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:31:48.044252 systemd[1]: Starting systemd-journald.service... Feb 9 19:31:48.044261 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:31:48.044270 systemd[1]: Starting systemd-resolved.service... Feb 9 19:31:48.044278 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:31:48.044287 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:31:48.044296 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:31:48.044315 systemd-journald[184]: Journal started Feb 9 19:31:48.044358 systemd-journald[184]: Runtime Journal (/run/log/journal/ad1b429c9ad445d1bc54708fa72186b9) is 4.9M, max 39.5M, 34.5M free. Feb 9 19:31:48.006001 systemd-modules-load[185]: Inserted module 'overlay' Feb 9 19:31:48.069946 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:31:48.069972 kernel: Bridge firewalling registered Feb 9 19:31:48.069995 systemd[1]: Started systemd-journald.service. Feb 9 19:31:48.070010 kernel: audit: type=1130 audit(1707507108.064:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.057483 systemd-resolved[186]: Positive Trust Anchors: Feb 9 19:31:48.081876 kernel: audit: type=1130 audit(1707507108.069:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.081911 kernel: audit: type=1130 audit(1707507108.077:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.057496 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:31:48.086945 kernel: audit: type=1130 audit(1707507108.081:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.086962 kernel: SCSI subsystem initialized Feb 9 19:31:48.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.057532 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:31:48.059951 systemd-modules-load[185]: Inserted module 'br_netfilter' Feb 9 19:31:48.060313 systemd-resolved[186]: Defaulting to hostname 'linux'. Feb 9 19:31:48.070394 systemd[1]: Started systemd-resolved.service. Feb 9 19:31:48.081440 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:31:48.082406 systemd[1]: Reached target nss-lookup.target. Feb 9 19:31:48.088241 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:31:48.091220 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:31:48.105890 kernel: audit: type=1130 audit(1707507108.098:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.098788 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:31:48.110231 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:31:48.110258 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:31:48.112086 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:31:48.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.113797 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:31:48.117910 kernel: audit: type=1130 audit(1707507108.113:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.118176 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:31:48.122509 systemd-modules-load[185]: Inserted module 'dm_multipath' Feb 9 19:31:48.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.124130 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:31:48.128779 kernel: audit: type=1130 audit(1707507108.123:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.128919 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:31:48.135120 dracut-cmdline[203]: dracut-dracut-053 Feb 9 19:31:48.137066 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:31:48.140695 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:31:48.145286 kernel: audit: type=1130 audit(1707507108.140:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.205822 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:31:48.218795 kernel: iscsi: registered transport (tcp) Feb 9 19:31:48.243103 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:31:48.243212 kernel: QLogic iSCSI HBA Driver Feb 9 19:31:48.297335 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:31:48.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.301163 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:31:48.303789 kernel: audit: type=1130 audit(1707507108.297:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.378878 kernel: raid6: sse2x4 gen() 13226 MB/s Feb 9 19:31:48.395830 kernel: raid6: sse2x4 xor() 7092 MB/s Feb 9 19:31:48.412868 kernel: raid6: sse2x2 gen() 14493 MB/s Feb 9 19:31:48.429916 kernel: raid6: sse2x2 xor() 8707 MB/s Feb 9 19:31:48.446832 kernel: raid6: sse2x1 gen() 11386 MB/s Feb 9 19:31:48.464679 kernel: raid6: sse2x1 xor() 6982 MB/s Feb 9 19:31:48.464912 kernel: raid6: using algorithm sse2x2 gen() 14493 MB/s Feb 9 19:31:48.464964 kernel: raid6: .... xor() 8707 MB/s, rmw enabled Feb 9 19:31:48.465460 kernel: raid6: using ssse3x2 recovery algorithm Feb 9 19:31:48.479790 kernel: xor: measuring software checksum speed Feb 9 19:31:48.482255 kernel: prefetch64-sse : 18423 MB/sec Feb 9 19:31:48.482289 kernel: generic_sse : 16819 MB/sec Feb 9 19:31:48.482309 kernel: xor: using function: prefetch64-sse (18423 MB/sec) Feb 9 19:31:48.596813 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:31:48.613423 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:31:48.614953 systemd[1]: Starting systemd-udevd.service... Feb 9 19:31:48.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.613000 audit: BPF prog-id=7 op=LOAD Feb 9 19:31:48.613000 audit: BPF prog-id=8 op=LOAD Feb 9 19:31:48.637472 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 9 19:31:48.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.642297 systemd[1]: Started systemd-udevd.service. Feb 9 19:31:48.645671 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:31:48.672061 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Feb 9 19:31:48.720197 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:31:48.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.723665 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:31:48.763354 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:31:48.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:48.825765 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Feb 9 19:31:48.840945 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:31:48.841001 kernel: GPT:17805311 != 41943039 Feb 9 19:31:48.841014 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:31:48.841026 kernel: GPT:17805311 != 41943039 Feb 9 19:31:48.841037 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:31:48.841048 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:31:48.876768 kernel: libata version 3.00 loaded. Feb 9 19:31:48.881774 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (433) Feb 9 19:31:48.882780 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 19:31:48.886374 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:31:48.921453 kernel: scsi host0: ata_piix Feb 9 19:31:48.921611 kernel: scsi host1: ata_piix Feb 9 19:31:48.921708 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Feb 9 19:31:48.921721 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Feb 9 19:31:48.922245 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:31:48.926217 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:31:48.930078 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:31:48.935290 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:31:48.936549 systemd[1]: Starting disk-uuid.service... Feb 9 19:31:48.949343 disk-uuid[461]: Primary Header is updated. Feb 9 19:31:48.949343 disk-uuid[461]: Secondary Entries is updated. Feb 9 19:31:48.949343 disk-uuid[461]: Secondary Header is updated. Feb 9 19:31:48.955757 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:31:48.961765 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:31:49.972779 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:31:49.973328 disk-uuid[462]: The operation has completed successfully. Feb 9 19:31:50.034564 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:31:50.036042 systemd[1]: Finished disk-uuid.service. Feb 9 19:31:50.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.062036 systemd[1]: Starting verity-setup.service... Feb 9 19:31:50.095784 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Feb 9 19:31:50.203469 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:31:50.206245 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:31:50.209179 systemd[1]: Finished verity-setup.service. Feb 9 19:31:50.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.346801 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:31:50.347529 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:31:50.348164 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:31:50.348886 systemd[1]: Starting ignition-setup.service... Feb 9 19:31:50.350070 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:31:50.367293 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:31:50.367336 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:31:50.367348 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:31:50.382706 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:31:50.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.395332 systemd[1]: Finished ignition-setup.service. Feb 9 19:31:50.396543 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:31:50.464335 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:31:50.467197 systemd[1]: Starting systemd-networkd.service... Feb 9 19:31:50.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.465000 audit: BPF prog-id=9 op=LOAD Feb 9 19:31:50.491560 systemd-networkd[632]: lo: Link UP Feb 9 19:31:50.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.491570 systemd-networkd[632]: lo: Gained carrier Feb 9 19:31:50.492062 systemd-networkd[632]: Enumeration completed Feb 9 19:31:50.492242 systemd[1]: Started systemd-networkd.service. Feb 9 19:31:50.492272 systemd-networkd[632]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:31:50.493271 systemd[1]: Reached target network.target. Feb 9 19:31:50.493614 systemd-networkd[632]: eth0: Link UP Feb 9 19:31:50.493618 systemd-networkd[632]: eth0: Gained carrier Feb 9 19:31:50.494886 systemd[1]: Starting iscsiuio.service... Feb 9 19:31:50.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.501586 systemd[1]: Started iscsiuio.service. Feb 9 19:31:50.510383 iscsid[642]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:31:50.510383 iscsid[642]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:31:50.510383 iscsid[642]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:31:50.510383 iscsid[642]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:31:50.510383 iscsid[642]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:31:50.510383 iscsid[642]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:31:50.510383 iscsid[642]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:31:50.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.506097 systemd[1]: Starting iscsid.service... Feb 9 19:31:50.510780 systemd-networkd[632]: eth0: DHCPv4 address 172.24.4.68/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 9 19:31:50.511553 systemd[1]: Started iscsid.service. Feb 9 19:31:50.514933 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:31:50.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.528370 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:31:50.528945 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:31:50.529368 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:31:50.529822 systemd[1]: Reached target remote-fs.target. Feb 9 19:31:50.532404 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:31:50.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.542049 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:31:50.683417 ignition[552]: Ignition 2.14.0 Feb 9 19:31:50.684216 ignition[552]: Stage: fetch-offline Feb 9 19:31:50.684381 ignition[552]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:31:50.684430 ignition[552]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:31:50.686816 ignition[552]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:31:50.687076 ignition[552]: parsed url from cmdline: "" Feb 9 19:31:50.687086 ignition[552]: no config URL provided Feb 9 19:31:50.687099 ignition[552]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:31:50.687120 ignition[552]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:31:50.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:50.689971 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:31:50.687134 ignition[552]: failed to fetch config: resource requires networking Feb 9 19:31:50.687866 ignition[552]: Ignition finished successfully Feb 9 19:31:50.693428 systemd[1]: Starting ignition-fetch.service... Feb 9 19:31:50.708822 ignition[657]: Ignition 2.14.0 Feb 9 19:31:50.710077 ignition[657]: Stage: fetch Feb 9 19:31:50.711101 ignition[657]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:31:50.711186 ignition[657]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:31:50.713551 ignition[657]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:31:50.713839 ignition[657]: parsed url from cmdline: "" Feb 9 19:31:50.713849 ignition[657]: no config URL provided Feb 9 19:31:50.713863 ignition[657]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:31:50.713918 ignition[657]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:31:50.721244 ignition[657]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Feb 9 19:31:50.721538 ignition[657]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Feb 9 19:31:50.722827 ignition[657]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Feb 9 19:31:51.071412 ignition[657]: GET result: OK Feb 9 19:31:51.071556 ignition[657]: parsing config with SHA512: 2c90aed3dd9e758fdc7cb3c127229236e93fa092ede4133b57782fe953635770bfc88cbd50c2e18e1140995f82ffcbb45f863c0567dc9933ff212d5c5384d3bd Feb 9 19:31:51.156872 unknown[657]: fetched base config from "system" Feb 9 19:31:51.158403 unknown[657]: fetched base config from "system" Feb 9 19:31:51.159714 unknown[657]: fetched user config from "openstack" Feb 9 19:31:51.162773 ignition[657]: fetch: fetch complete Feb 9 19:31:51.163839 ignition[657]: fetch: fetch passed Feb 9 19:31:51.163900 ignition[657]: Ignition finished successfully Feb 9 19:31:51.165308 systemd[1]: Finished ignition-fetch.service. Feb 9 19:31:51.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.167652 systemd[1]: Starting ignition-kargs.service... Feb 9 19:31:51.178361 ignition[663]: Ignition 2.14.0 Feb 9 19:31:51.178388 ignition[663]: Stage: kargs Feb 9 19:31:51.178632 ignition[663]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:31:51.178674 ignition[663]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:31:51.182431 ignition[663]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:31:51.188134 ignition[663]: kargs: kargs passed Feb 9 19:31:51.193309 systemd[1]: Finished ignition-kargs.service. Feb 9 19:31:51.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.188246 ignition[663]: Ignition finished successfully Feb 9 19:31:51.196259 systemd[1]: Starting ignition-disks.service... Feb 9 19:31:51.212991 ignition[669]: Ignition 2.14.0 Feb 9 19:31:51.213019 ignition[669]: Stage: disks Feb 9 19:31:51.213261 ignition[669]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:31:51.213302 ignition[669]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:31:51.215561 ignition[669]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:31:51.218950 ignition[669]: disks: disks passed Feb 9 19:31:51.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.220626 systemd[1]: Finished ignition-disks.service. Feb 9 19:31:51.219041 ignition[669]: Ignition finished successfully Feb 9 19:31:51.222232 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:31:51.223440 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:31:51.225679 systemd[1]: Reached target local-fs.target. Feb 9 19:31:51.227883 systemd[1]: Reached target sysinit.target. Feb 9 19:31:51.230131 systemd[1]: Reached target basic.target. Feb 9 19:31:51.234274 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:31:51.263121 systemd-fsck[676]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:31:51.275228 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:31:51.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.278083 systemd[1]: Mounting sysroot.mount... Feb 9 19:31:51.299799 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:31:51.300303 systemd[1]: Mounted sysroot.mount. Feb 9 19:31:51.301594 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:31:51.306024 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:31:51.307976 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:31:51.309382 systemd[1]: Starting flatcar-openstack-hostname.service... Feb 9 19:31:51.315478 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:31:51.315541 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:31:51.320317 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:31:51.329063 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:31:51.331661 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:31:51.346419 initrd-setup-root[688]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:31:51.353758 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (683) Feb 9 19:31:51.362590 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:31:51.362618 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:31:51.362630 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:31:51.366519 initrd-setup-root[708]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:31:51.373000 initrd-setup-root[720]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:31:51.380482 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:31:51.383250 initrd-setup-root[730]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:31:51.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.471654 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:31:51.472841 systemd[1]: Starting ignition-mount.service... Feb 9 19:31:51.473844 systemd[1]: Starting sysroot-boot.service... Feb 9 19:31:51.483652 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:31:51.483836 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:31:51.516350 ignition[750]: INFO : Ignition 2.14.0 Feb 9 19:31:51.518088 ignition[750]: INFO : Stage: mount Feb 9 19:31:51.519562 ignition[750]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:31:51.521341 ignition[750]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:31:51.525627 ignition[750]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:31:51.528182 ignition[750]: INFO : mount: mount passed Feb 9 19:31:51.528720 ignition[750]: INFO : Ignition finished successfully Feb 9 19:31:51.530072 systemd[1]: Finished ignition-mount.service. Feb 9 19:31:51.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.535470 systemd[1]: Finished sysroot-boot.service. Feb 9 19:31:51.562297 coreos-metadata[682]: Feb 09 19:31:51.562 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 9 19:31:51.589577 coreos-metadata[682]: Feb 09 19:31:51.589 INFO Fetch successful Feb 9 19:31:51.590172 coreos-metadata[682]: Feb 09 19:31:51.590 INFO wrote hostname ci-3510-3-2-2-bf9c3542bb.novalocal to /sysroot/etc/hostname Feb 9 19:31:51.594494 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Feb 9 19:31:51.594718 systemd[1]: Finished flatcar-openstack-hostname.service. Feb 9 19:31:51.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:51.598943 systemd[1]: Starting ignition-files.service... Feb 9 19:31:51.612695 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:31:51.627859 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (759) Feb 9 19:31:51.634874 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:31:51.634930 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:31:51.634957 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:31:51.648658 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:31:51.671252 ignition[778]: INFO : Ignition 2.14.0 Feb 9 19:31:51.671252 ignition[778]: INFO : Stage: files Feb 9 19:31:51.673818 ignition[778]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:31:51.673818 ignition[778]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:31:51.673818 ignition[778]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:31:51.681851 ignition[778]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:31:51.681851 ignition[778]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:31:51.681851 ignition[778]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:31:51.688857 ignition[778]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:31:51.690932 ignition[778]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:31:51.690932 ignition[778]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:31:51.690876 unknown[778]: wrote ssh authorized keys file for user: core Feb 9 19:31:51.696102 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:31:51.696102 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:31:51.827173 systemd-networkd[632]: eth0: Gained IPv6LL Feb 9 19:31:52.270316 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:31:52.974325 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:31:52.974325 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:31:52.974325 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:31:52.982568 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:31:53.456308 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:31:53.973342 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:31:53.974902 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:31:53.976034 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:31:53.976989 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:31:54.613868 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:31:54.934204 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:31:54.945048 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:31:54.945048 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:31:55.076499 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:31:55.982898 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:31:55.982898 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:31:55.988326 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:31:55.988326 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:31:56.096390 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 19:31:58.390103 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:31:58.391846 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:31:58.392753 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:31:58.393656 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:31:58.507398 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 19:31:59.408692 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 9 19:31:59.410490 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:31:59.411398 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:31:59.412380 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:31:59.413181 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:31:59.413971 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:31:59.413971 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:31:59.413971 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:31:59.416380 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:31:59.416380 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:31:59.416380 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:31:59.416380 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:31:59.420933 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:31:59.421780 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:31:59.421780 ignition[778]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:31:59.482397 ignition[778]: INFO : files: op(f): op(10): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 9 19:31:59.483482 ignition[778]: INFO : files: op(f): op(10): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 9 19:31:59.483482 ignition[778]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:31:59.483482 ignition[778]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Feb 9 19:31:59.483482 ignition[778]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(13): op(14): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(13): op(14): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(19): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:31:59.486894 ignition[778]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:31:59.504372 ignition[778]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:31:59.504372 ignition[778]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:31:59.504372 ignition[778]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:31:59.504372 ignition[778]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:31:59.504372 ignition[778]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:31:59.549794 ignition[778]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:31:59.552021 ignition[778]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:31:59.552021 ignition[778]: INFO : files: files passed Feb 9 19:31:59.552021 ignition[778]: INFO : Ignition finished successfully Feb 9 19:31:59.572082 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 9 19:31:59.572131 kernel: audit: type=1130 audit(1707507119.557:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.552149 systemd[1]: Finished ignition-files.service. Feb 9 19:31:59.562581 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:31:59.573297 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:31:59.575112 systemd[1]: Starting ignition-quench.service... Feb 9 19:31:59.599015 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:31:59.599228 systemd[1]: Finished ignition-quench.service. Feb 9 19:31:59.619946 kernel: audit: type=1130 audit(1707507119.600:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.619993 kernel: audit: type=1131 audit(1707507119.600:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.621810 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:31:59.623544 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:31:59.634977 kernel: audit: type=1130 audit(1707507119.624:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.625444 systemd[1]: Reached target ignition-complete.target. Feb 9 19:31:59.637545 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:31:59.667249 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:31:59.667479 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:31:59.695505 kernel: audit: type=1130 audit(1707507119.669:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.695554 kernel: audit: type=1131 audit(1707507119.669:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.670111 systemd[1]: Reached target initrd-fs.target. Feb 9 19:31:59.696549 systemd[1]: Reached target initrd.target. Feb 9 19:31:59.698800 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:31:59.700416 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:31:59.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.736834 kernel: audit: type=1130 audit(1707507119.727:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.726915 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:31:59.729540 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:31:59.760919 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:31:59.761118 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:31:59.762996 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:31:59.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.763762 kernel: audit: type=1130 audit(1707507119.761:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.763786 kernel: audit: type=1131 audit(1707507119.761:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.779942 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:31:59.781145 systemd[1]: Stopped target timers.target. Feb 9 19:31:59.782774 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:31:59.787851 kernel: audit: type=1131 audit(1707507119.783:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.782877 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:31:59.784209 systemd[1]: Stopped target initrd.target. Feb 9 19:31:59.788869 systemd[1]: Stopped target basic.target. Feb 9 19:31:59.790287 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:31:59.791828 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:31:59.793309 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:31:59.794897 systemd[1]: Stopped target remote-fs.target. Feb 9 19:31:59.796342 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:31:59.797966 systemd[1]: Stopped target sysinit.target. Feb 9 19:31:59.799381 systemd[1]: Stopped target local-fs.target. Feb 9 19:31:59.800922 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:31:59.802392 systemd[1]: Stopped target swap.target. Feb 9 19:31:59.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.803846 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:31:59.803939 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:31:59.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.805357 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:31:59.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.806794 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:31:59.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.806885 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:31:59.808459 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:31:59.808543 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:31:59.810022 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:31:59.810108 systemd[1]: Stopped ignition-files.service. Feb 9 19:31:59.812857 systemd[1]: Stopping ignition-mount.service... Feb 9 19:31:59.814413 systemd[1]: Stopping iscsiuio.service... Feb 9 19:31:59.823855 ignition[816]: INFO : Ignition 2.14.0 Feb 9 19:31:59.823855 ignition[816]: INFO : Stage: umount Feb 9 19:31:59.823855 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:31:59.823855 ignition[816]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:31:59.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.827805 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:31:59.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.831723 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:31:59.831723 ignition[816]: INFO : umount: umount passed Feb 9 19:31:59.831723 ignition[816]: INFO : Ignition finished successfully Feb 9 19:31:59.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.829215 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:31:59.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.829274 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:31:59.829759 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:31:59.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.829794 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:31:59.831149 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:31:59.831253 systemd[1]: Stopped iscsiuio.service. Feb 9 19:31:59.832706 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:31:59.832805 systemd[1]: Stopped ignition-mount.service. Feb 9 19:31:59.833783 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:31:59.833822 systemd[1]: Stopped ignition-disks.service. Feb 9 19:31:59.834830 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:31:59.834866 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:31:59.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.835921 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:31:59.835956 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:31:59.836700 systemd[1]: Stopped target network.target. Feb 9 19:31:59.837677 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:31:59.837719 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:31:59.838817 systemd[1]: Stopped target paths.target. Feb 9 19:31:59.839831 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:31:59.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.843885 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:31:59.844360 systemd[1]: Stopped target slices.target. Feb 9 19:31:59.844801 systemd[1]: Stopped target sockets.target. Feb 9 19:31:59.845201 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:31:59.845225 systemd[1]: Closed iscsid.socket. Feb 9 19:31:59.845606 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:31:59.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.845634 systemd[1]: Closed iscsiuio.socket. Feb 9 19:31:59.846041 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:31:59.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.846087 systemd[1]: Stopped ignition-setup.service. Feb 9 19:31:59.868000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:31:59.846883 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:31:59.847459 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:31:59.851826 systemd-networkd[632]: eth0: DHCPv6 lease lost Feb 9 19:31:59.871000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:31:59.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.852687 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:31:59.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.852798 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:31:59.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.854861 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:31:59.854900 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:31:59.857275 systemd[1]: Stopping network-cleanup.service... Feb 9 19:31:59.857704 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:31:59.857775 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:31:59.858282 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:31:59.858322 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:31:59.858916 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:31:59.858960 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:31:59.859552 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:31:59.863841 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:31:59.864359 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:31:59.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.864455 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:31:59.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.866919 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:31:59.867061 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:31:59.869128 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:31:59.869179 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:31:59.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.870743 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:31:59.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.870778 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:31:59.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.871689 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:31:59.871829 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:31:59.873301 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:31:59.873357 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:31:59.874307 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:31:59.874350 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:31:59.876043 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:31:59.876820 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:31:59.876872 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:31:59.886853 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:31:59.886907 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:31:59.887532 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:31:59.887569 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:31:59.893009 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:31:59.893090 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:31:59.893839 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:31:59.893979 systemd[1]: Stopped network-cleanup.service. Feb 9 19:31:59.894865 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:31:59.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.894947 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:31:59.905374 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:31:59.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:31:59.905470 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:31:59.906398 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:31:59.907380 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:31:59.907428 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:31:59.909206 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:31:59.927782 systemd[1]: Switching root. Feb 9 19:31:59.948144 iscsid[642]: iscsid shutting down. Feb 9 19:31:59.948637 systemd-journald[184]: Journal stopped Feb 9 19:32:05.118963 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Feb 9 19:32:05.119052 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:32:05.119092 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:32:05.119120 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:32:05.119146 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:32:05.119171 kernel: SELinux: policy capability open_perms=1 Feb 9 19:32:05.119196 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:32:05.119228 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:32:05.119253 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:32:05.119278 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:32:05.119307 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:32:05.119331 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:32:05.119357 systemd[1]: Successfully loaded SELinux policy in 90.713ms. Feb 9 19:32:05.119404 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.430ms. Feb 9 19:32:05.119436 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:32:05.119464 systemd[1]: Detected virtualization kvm. Feb 9 19:32:05.119514 systemd[1]: Detected architecture x86-64. Feb 9 19:32:05.119541 systemd[1]: Detected first boot. Feb 9 19:32:05.119573 systemd[1]: Hostname set to . Feb 9 19:32:05.119600 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:32:05.119627 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:32:05.119653 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:32:05.119681 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:32:05.119718 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:32:05.119785 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:32:05.119821 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 9 19:32:05.119847 kernel: audit: type=1334 audit(1707507124.724:89): prog-id=12 op=LOAD Feb 9 19:32:05.119871 kernel: audit: type=1334 audit(1707507124.727:90): prog-id=3 op=UNLOAD Feb 9 19:32:05.119895 kernel: audit: type=1334 audit(1707507124.729:91): prog-id=13 op=LOAD Feb 9 19:32:05.119927 kernel: audit: type=1334 audit(1707507124.731:92): prog-id=14 op=LOAD Feb 9 19:32:05.119952 kernel: audit: type=1334 audit(1707507124.731:93): prog-id=4 op=UNLOAD Feb 9 19:32:05.119977 kernel: audit: type=1334 audit(1707507124.731:94): prog-id=5 op=UNLOAD Feb 9 19:32:05.120002 kernel: audit: type=1334 audit(1707507124.733:95): prog-id=15 op=LOAD Feb 9 19:32:05.120030 kernel: audit: type=1334 audit(1707507124.733:96): prog-id=12 op=UNLOAD Feb 9 19:32:05.120054 kernel: audit: type=1334 audit(1707507124.735:97): prog-id=16 op=LOAD Feb 9 19:32:05.120079 kernel: audit: type=1334 audit(1707507124.737:98): prog-id=17 op=LOAD Feb 9 19:32:05.120104 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:32:05.120132 systemd[1]: Stopped iscsid.service. Feb 9 19:32:05.120160 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:32:05.120202 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:32:05.120235 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:32:05.120264 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:32:05.120292 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:32:05.120320 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:32:05.120345 systemd[1]: Created slice system-getty.slice. Feb 9 19:32:05.120370 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:32:05.120395 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:32:05.120425 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:32:05.120451 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:32:05.120476 systemd[1]: Created slice user.slice. Feb 9 19:32:05.120502 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:32:05.120527 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:32:05.120552 systemd[1]: Set up automount boot.automount. Feb 9 19:32:05.120577 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:32:05.120602 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:32:05.120626 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:32:05.120654 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:32:05.120679 systemd[1]: Reached target integritysetup.target. Feb 9 19:32:05.120705 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:32:05.128425 systemd[1]: Reached target remote-fs.target. Feb 9 19:32:05.128454 systemd[1]: Reached target slices.target. Feb 9 19:32:05.128467 systemd[1]: Reached target swap.target. Feb 9 19:32:05.128479 systemd[1]: Reached target torcx.target. Feb 9 19:32:05.128492 systemd[1]: Reached target veritysetup.target. Feb 9 19:32:05.128504 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:32:05.128515 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:32:05.128530 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:32:05.128557 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:32:05.128569 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:32:05.128581 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:32:05.128592 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:32:05.128603 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:32:05.128614 systemd[1]: Mounting media.mount... Feb 9 19:32:05.128626 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:32:05.128637 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:32:05.128651 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:32:05.128670 systemd[1]: Mounting tmp.mount... Feb 9 19:32:05.128683 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:32:05.128695 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:32:05.128706 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:32:05.128718 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:32:05.128742 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:32:05.128755 systemd[1]: Starting modprobe@drm.service... Feb 9 19:32:05.128766 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:32:05.128779 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:32:05.128791 systemd[1]: Starting modprobe@loop.service... Feb 9 19:32:05.128803 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:32:05.128814 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:32:05.128826 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:32:05.128837 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:32:05.128849 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:32:05.128860 systemd[1]: Stopped systemd-journald.service. Feb 9 19:32:05.128871 systemd[1]: Starting systemd-journald.service... Feb 9 19:32:05.128884 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:32:05.128896 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:32:05.128906 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:32:05.128917 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:32:05.128928 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:32:05.128939 systemd[1]: Stopped verity-setup.service. Feb 9 19:32:05.128951 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:32:05.128962 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:32:05.128973 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:32:05.128986 systemd[1]: Mounted media.mount. Feb 9 19:32:05.128998 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:32:05.129009 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:32:05.129020 systemd[1]: Mounted tmp.mount. Feb 9 19:32:05.129031 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:32:05.129042 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:32:05.129054 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:32:05.129068 systemd-journald[910]: Journal started Feb 9 19:32:05.129115 systemd-journald[910]: Runtime Journal (/run/log/journal/ad1b429c9ad445d1bc54708fa72186b9) is 4.9M, max 39.5M, 34.5M free. Feb 9 19:32:00.221000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:32:00.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:32:00.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:32:00.355000 audit: BPF prog-id=10 op=LOAD Feb 9 19:32:00.355000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:32:00.356000 audit: BPF prog-id=11 op=LOAD Feb 9 19:32:00.356000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:32:00.559000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:32:00.559000 audit[848]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:00.559000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:32:00.561000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:32:00.561000 audit[848]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079a9 a2=1ed a3=0 items=2 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:00.561000 audit: CWD cwd="/" Feb 9 19:32:00.561000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:00.561000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:00.561000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:32:04.724000 audit: BPF prog-id=12 op=LOAD Feb 9 19:32:04.727000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:32:04.729000 audit: BPF prog-id=13 op=LOAD Feb 9 19:32:04.731000 audit: BPF prog-id=14 op=LOAD Feb 9 19:32:04.731000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:32:04.731000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:32:04.733000 audit: BPF prog-id=15 op=LOAD Feb 9 19:32:04.733000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:32:04.735000 audit: BPF prog-id=16 op=LOAD Feb 9 19:32:04.737000 audit: BPF prog-id=17 op=LOAD Feb 9 19:32:04.737000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:32:04.737000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:32:04.744000 audit: BPF prog-id=18 op=LOAD Feb 9 19:32:04.744000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:32:04.748000 audit: BPF prog-id=19 op=LOAD Feb 9 19:32:04.748000 audit: BPF prog-id=20 op=LOAD Feb 9 19:32:04.748000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:32:04.748000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:32:04.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:04.756000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:32:04.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:04.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:04.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.019000 audit: BPF prog-id=21 op=LOAD Feb 9 19:32:05.019000 audit: BPF prog-id=22 op=LOAD Feb 9 19:32:05.019000 audit: BPF prog-id=23 op=LOAD Feb 9 19:32:05.019000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:32:05.019000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:32:05.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.115000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:32:05.115000 audit[910]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffeebd27910 a2=4000 a3=7ffeebd279ac items=0 ppid=1 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:05.115000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:32:05.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:04.721229 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:32:00.556793 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:32:04.721250 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 19:32:00.557802 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:32:04.751489 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:32:00.557823 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:32:00.557864 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:32:00.557887 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:32:05.134810 systemd[1]: Started systemd-journald.service. Feb 9 19:32:05.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:00.557919 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:32:05.135555 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:32:00.557933 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:32:05.135697 systemd[1]: Finished modprobe@drm.service. Feb 9 19:32:00.558167 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:32:00.558208 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:32:00.558223 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:32:00.559131 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:32:00.559170 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:32:00.559192 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:32:00.559209 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:32:00.559228 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:32:05.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.137191 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:32:00.559244 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:32:05.137773 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:32:04.241182 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:05.138493 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:32:04.241480 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:05.139772 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:32:04.241747 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:05.140416 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:32:04.242167 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:04.242301 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:32:04.242812 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-09T19:32:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:32:05.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.142307 systemd[1]: Reached target network-pre.target. Feb 9 19:32:05.142932 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:32:05.144984 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:32:05.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.146456 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:32:05.147234 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:32:05.148469 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:32:05.150824 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:32:05.151754 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:32:05.152795 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:32:05.157103 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:32:05.160915 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:32:05.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.166950 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:32:05.167598 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:32:05.171011 systemd-journald[910]: Time spent on flushing to /var/log/journal/ad1b429c9ad445d1bc54708fa72186b9 is 43.227ms for 1141 entries. Feb 9 19:32:05.171011 systemd-journald[910]: System Journal (/var/log/journal/ad1b429c9ad445d1bc54708fa72186b9) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:32:05.256111 systemd-journald[910]: Received client request to flush runtime journal. Feb 9 19:32:05.256179 kernel: fuse: init (API version 7.34) Feb 9 19:32:05.256209 kernel: loop: module loaded Feb 9 19:32:05.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.194974 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:32:05.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.196696 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:32:05.197893 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:32:05.199412 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:32:05.204831 systemd[1]: Finished modprobe@loop.service. Feb 9 19:32:05.206645 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:32:05.207559 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:32:05.210062 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:32:05.245515 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:32:05.247341 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:32:05.257331 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:32:05.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.271639 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:32:05.273167 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:32:05.315821 udevadm[959]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:32:05.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.796370 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:32:05.800557 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:32:05.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:05.873577 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:32:06.229378 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:32:06.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.231000 audit: BPF prog-id=24 op=LOAD Feb 9 19:32:06.231000 audit: BPF prog-id=25 op=LOAD Feb 9 19:32:06.231000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:32:06.231000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:32:06.233475 systemd[1]: Starting systemd-udevd.service... Feb 9 19:32:06.273595 systemd-udevd[962]: Using default interface naming scheme 'v252'. Feb 9 19:32:06.318837 systemd[1]: Started systemd-udevd.service. Feb 9 19:32:06.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.324000 audit: BPF prog-id=26 op=LOAD Feb 9 19:32:06.326650 systemd[1]: Starting systemd-networkd.service... Feb 9 19:32:06.340000 audit: BPF prog-id=27 op=LOAD Feb 9 19:32:06.341000 audit: BPF prog-id=28 op=LOAD Feb 9 19:32:06.341000 audit: BPF prog-id=29 op=LOAD Feb 9 19:32:06.344551 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:32:06.375177 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:32:06.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.420035 systemd[1]: Started systemd-userdbd.service. Feb 9 19:32:06.439042 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:32:06.463774 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:32:06.468775 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:32:06.486000 audit[966]: AVC avc: denied { confidentiality } for pid=966 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:32:06.507364 systemd-networkd[977]: lo: Link UP Feb 9 19:32:06.507374 systemd-networkd[977]: lo: Gained carrier Feb 9 19:32:06.486000 audit[966]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5560bf576e50 a1=32194 a2=7feef3dadbc5 a3=5 items=108 ppid=962 pid=966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:06.486000 audit: CWD cwd="/" Feb 9 19:32:06.486000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=1 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=2 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=3 name=(null) inode=14059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=4 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.508888 systemd-networkd[977]: Enumeration completed Feb 9 19:32:06.508994 systemd[1]: Started systemd-networkd.service. Feb 9 19:32:06.509812 systemd-networkd[977]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:32:06.486000 audit: PATH item=5 name=(null) inode=14060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=6 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=7 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=8 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=9 name=(null) inode=14062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=10 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=11 name=(null) inode=14063 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=12 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=13 name=(null) inode=14064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=14 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=15 name=(null) inode=14065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=16 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=17 name=(null) inode=14066 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=18 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=19 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=20 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=21 name=(null) inode=14068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=22 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=23 name=(null) inode=14069 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=24 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=25 name=(null) inode=14070 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=26 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=27 name=(null) inode=14071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=28 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=29 name=(null) inode=14072 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=30 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=31 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=32 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=33 name=(null) inode=14074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=34 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=35 name=(null) inode=14075 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=36 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=37 name=(null) inode=14076 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=38 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=39 name=(null) inode=14077 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=40 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=41 name=(null) inode=14078 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=42 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=43 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=44 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.511657 systemd-networkd[977]: eth0: Link UP Feb 9 19:32:06.511662 systemd-networkd[977]: eth0: Gained carrier Feb 9 19:32:06.486000 audit: PATH item=45 name=(null) inode=14080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=46 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=47 name=(null) inode=14081 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=48 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=49 name=(null) inode=14082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=50 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=51 name=(null) inode=14083 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=52 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=53 name=(null) inode=14084 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=55 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=56 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=57 name=(null) inode=14086 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=58 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=59 name=(null) inode=14087 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=60 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=61 name=(null) inode=14088 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=62 name=(null) inode=14088 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=63 name=(null) inode=14089 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=64 name=(null) inode=14088 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=65 name=(null) inode=14090 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=66 name=(null) inode=14088 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=67 name=(null) inode=14091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=68 name=(null) inode=14088 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=69 name=(null) inode=14092 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=70 name=(null) inode=14088 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=71 name=(null) inode=14093 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=72 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=73 name=(null) inode=14094 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=74 name=(null) inode=14094 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=75 name=(null) inode=14095 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=76 name=(null) inode=14094 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=77 name=(null) inode=14096 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=78 name=(null) inode=14094 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=79 name=(null) inode=14097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=80 name=(null) inode=14094 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=81 name=(null) inode=14098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=82 name=(null) inode=14094 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=83 name=(null) inode=14099 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=84 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=85 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=86 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=87 name=(null) inode=14101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=88 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=89 name=(null) inode=14102 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=90 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=91 name=(null) inode=14103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=92 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=93 name=(null) inode=14104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=94 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=95 name=(null) inode=14105 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=96 name=(null) inode=14085 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=97 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=98 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=99 name=(null) inode=14107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=100 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=101 name=(null) inode=14108 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=102 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=103 name=(null) inode=14109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=104 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=105 name=(null) inode=14110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=106 name=(null) inode=14106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PATH item=107 name=(null) inode=14111 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:06.486000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:32:06.522190 systemd-networkd[977]: eth0: DHCPv4 address 172.24.4.68/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 9 19:32:06.526904 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 9 19:32:06.538761 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 19:32:06.541751 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:32:06.580106 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:32:06.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.581682 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:32:06.605306 lvm[991]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:32:06.632040 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:32:06.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.633421 systemd[1]: Reached target cryptsetup.target. Feb 9 19:32:06.636825 systemd[1]: Starting lvm2-activation.service... Feb 9 19:32:06.640798 lvm[992]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:32:06.666060 systemd[1]: Finished lvm2-activation.service. Feb 9 19:32:06.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.667374 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:32:06.668489 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:32:06.668551 systemd[1]: Reached target local-fs.target. Feb 9 19:32:06.669613 systemd[1]: Reached target machines.target. Feb 9 19:32:06.673201 systemd[1]: Starting ldconfig.service... Feb 9 19:32:06.675938 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:32:06.676037 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:32:06.678231 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:32:06.681226 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:32:06.689049 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:32:06.690660 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:32:06.690815 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:32:06.693319 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:32:06.696535 systemd[1]: boot.automount: Got automount request for /boot, triggered by 994 (bootctl) Feb 9 19:32:06.699972 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:32:06.701777 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:32:06.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:06.717287 systemd-tmpfiles[997]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:32:06.726574 systemd-tmpfiles[997]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:32:06.734057 systemd-tmpfiles[997]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:32:07.571145 systemd-networkd[977]: eth0: Gained IPv6LL Feb 9 19:32:08.067846 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:32:08.072249 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:32:08.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.190153 systemd-fsck[1002]: fsck.fat 4.2 (2021-01-31) Feb 9 19:32:08.190153 systemd-fsck[1002]: /dev/vda1: 789 files, 115339/258078 clusters Feb 9 19:32:08.194028 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:32:08.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.197782 systemd[1]: Mounting boot.mount... Feb 9 19:32:08.219640 systemd[1]: Mounted boot.mount. Feb 9 19:32:08.270380 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:32:08.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.335636 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:32:08.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.339409 systemd[1]: Starting audit-rules.service... Feb 9 19:32:08.342518 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:32:08.348497 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:32:08.352000 audit: BPF prog-id=30 op=LOAD Feb 9 19:32:08.355000 audit: BPF prog-id=31 op=LOAD Feb 9 19:32:08.353551 systemd[1]: Starting systemd-resolved.service... Feb 9 19:32:08.357489 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:32:08.360624 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:32:08.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.367242 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:32:08.367839 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:32:08.387000 audit[1014]: SYSTEM_BOOT pid=1014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.391568 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:32:08.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:08.421892 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:32:08.441000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:32:08.441000 audit[1025]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea146f0a0 a2=420 a3=0 items=0 ppid=1005 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:08.441000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:32:08.442984 augenrules[1025]: No rules Feb 9 19:32:08.443851 systemd[1]: Finished audit-rules.service. Feb 9 19:32:08.454015 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:32:08.454682 systemd[1]: Reached target time-set.target. Feb 9 19:32:08.998153 systemd-timesyncd[1013]: Contacted time server 163.172.179.38:123 (0.flatcar.pool.ntp.org). Feb 9 19:32:08.998610 systemd-resolved[1012]: Positive Trust Anchors: Feb 9 19:32:08.998620 systemd-resolved[1012]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:32:08.998657 systemd-resolved[1012]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:32:08.998967 systemd-timesyncd[1013]: Initial clock synchronization to Fri 2024-02-09 19:32:08.997944 UTC. Feb 9 19:32:09.007442 systemd-resolved[1012]: Using system hostname 'ci-3510-3-2-2-bf9c3542bb.novalocal'. Feb 9 19:32:09.009104 systemd[1]: Started systemd-resolved.service. Feb 9 19:32:09.009627 systemd[1]: Reached target network.target. Feb 9 19:32:09.010067 systemd[1]: Reached target nss-lookup.target. Feb 9 19:32:09.229889 ldconfig[993]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:32:09.242125 systemd[1]: Finished ldconfig.service. Feb 9 19:32:09.245854 systemd[1]: Starting systemd-update-done.service... Feb 9 19:32:09.259167 systemd[1]: Finished systemd-update-done.service. Feb 9 19:32:09.260435 systemd[1]: Reached target sysinit.target. Feb 9 19:32:09.261719 systemd[1]: Started motdgen.path. Feb 9 19:32:09.262848 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:32:09.264535 systemd[1]: Started logrotate.timer. Feb 9 19:32:09.265737 systemd[1]: Started mdadm.timer. Feb 9 19:32:09.266769 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:32:09.267880 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:32:09.267976 systemd[1]: Reached target paths.target. Feb 9 19:32:09.269074 systemd[1]: Reached target timers.target. Feb 9 19:32:09.271199 systemd[1]: Listening on dbus.socket. Feb 9 19:32:09.274201 systemd[1]: Starting docker.socket... Feb 9 19:32:09.280750 systemd[1]: Listening on sshd.socket. Feb 9 19:32:09.282113 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:32:09.283030 systemd[1]: Listening on docker.socket. Feb 9 19:32:09.284225 systemd[1]: Reached target sockets.target. Feb 9 19:32:09.285287 systemd[1]: Reached target basic.target. Feb 9 19:32:09.286432 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:32:09.286504 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:32:09.288495 systemd[1]: Starting containerd.service... Feb 9 19:32:09.291513 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:32:09.294904 systemd[1]: Starting dbus.service... Feb 9 19:32:09.299587 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:32:09.308267 systemd[1]: Starting extend-filesystems.service... Feb 9 19:32:09.309846 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:32:09.312896 systemd[1]: Starting motdgen.service... Feb 9 19:32:09.320098 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:32:09.326089 systemd[1]: Starting prepare-critools.service... Feb 9 19:32:09.328123 systemd[1]: Starting prepare-helm.service... Feb 9 19:32:09.329488 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:32:09.332062 systemd[1]: Starting sshd-keygen.service... Feb 9 19:32:09.336602 systemd[1]: Starting systemd-logind.service... Feb 9 19:32:09.337086 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:32:09.337146 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:32:09.337522 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:32:09.338237 systemd[1]: Starting update-engine.service... Feb 9 19:32:09.341517 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:32:09.358712 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:32:09.358847 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:32:09.361353 jq[1049]: true Feb 9 19:32:09.364026 tar[1052]: crictl Feb 9 19:32:09.375384 systemd[1]: Created slice system-sshd.slice. Feb 9 19:32:09.379087 tar[1053]: linux-amd64/helm Feb 9 19:32:09.383958 tar[1051]: ./ Feb 9 19:32:09.383958 tar[1051]: ./macvlan Feb 9 19:32:09.390054 jq[1039]: false Feb 9 19:32:09.398329 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:32:09.399206 jq[1062]: true Feb 9 19:32:09.398485 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:32:09.409718 dbus-daemon[1036]: [system] SELinux support is enabled Feb 9 19:32:09.410137 systemd[1]: Started dbus.service. Feb 9 19:32:09.416096 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:32:09.416124 systemd[1]: Reached target system-config.target. Feb 9 19:32:09.418032 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:32:09.418077 systemd[1]: Reached target user-config.target. Feb 9 19:32:09.423181 extend-filesystems[1040]: Found vda Feb 9 19:32:09.429580 extend-filesystems[1040]: Found vda1 Feb 9 19:32:09.430710 extend-filesystems[1040]: Found vda2 Feb 9 19:32:09.432947 extend-filesystems[1040]: Found vda3 Feb 9 19:32:09.433087 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:32:09.433244 systemd[1]: Finished motdgen.service. Feb 9 19:32:09.433888 extend-filesystems[1040]: Found usr Feb 9 19:32:09.437308 extend-filesystems[1040]: Found vda4 Feb 9 19:32:09.437838 extend-filesystems[1040]: Found vda6 Feb 9 19:32:09.438471 extend-filesystems[1040]: Found vda7 Feb 9 19:32:09.439332 extend-filesystems[1040]: Found vda9 Feb 9 19:32:09.439962 extend-filesystems[1040]: Checking size of /dev/vda9 Feb 9 19:32:09.462446 extend-filesystems[1040]: Resized partition /dev/vda9 Feb 9 19:32:09.472185 extend-filesystems[1095]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:32:09.515954 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Feb 9 19:32:09.516136 env[1054]: time="2024-02-09T19:32:09.515846736Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:32:09.530354 systemd-logind[1047]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:32:09.530380 systemd-logind[1047]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:32:09.540193 update_engine[1048]: I0209 19:32:09.538393 1048 main.cc:92] Flatcar Update Engine starting Feb 9 19:32:09.540577 systemd-logind[1047]: New seat seat0. Feb 9 19:32:09.552185 update_engine[1048]: I0209 19:32:09.552068 1048 update_check_scheduler.cc:74] Next update check in 6m38s Feb 9 19:32:09.552380 systemd[1]: Started systemd-logind.service. Feb 9 19:32:09.553114 systemd[1]: Started update-engine.service. Feb 9 19:32:09.555356 systemd[1]: Started locksmithd.service. Feb 9 19:32:09.600862 tar[1051]: ./static Feb 9 19:32:09.602350 bash[1092]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:32:09.603135 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:32:09.608955 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Feb 9 19:32:09.610823 coreos-metadata[1035]: Feb 09 19:32:09.609 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Feb 9 19:32:09.683981 env[1054]: time="2024-02-09T19:32:09.623791026Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:32:09.689224 extend-filesystems[1095]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 19:32:09.689224 extend-filesystems[1095]: old_desc_blocks = 1, new_desc_blocks = 3 Feb 9 19:32:09.689224 extend-filesystems[1095]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Feb 9 19:32:09.704454 extend-filesystems[1040]: Resized filesystem in /dev/vda9 Feb 9 19:32:09.693222 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.690651362Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.692129364Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.692157567Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.692443503Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.692465415Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.692499969Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.692511952Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.692614634Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.693404195Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:32:09.708199 env[1054]: time="2024-02-09T19:32:09.693565388Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:32:09.693378 systemd[1]: Finished extend-filesystems.service. Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.693586758Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.693684551Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.693701503Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710432913Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710466015Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710482496Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710551926Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710601849Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710621035Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710639590Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710702819Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710720362Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710754917Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.715450 env[1054]: time="2024-02-09T19:32:09.710774934Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.713992 systemd[1]: Started containerd.service. Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.710791315Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.710943911Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711066982Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711454118Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711481700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711497179Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711567060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711584332Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711597777Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711664262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711678739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711713885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711728152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.716388 env[1054]: time="2024-02-09T19:32:09.711741757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.711758068Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.711965717Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.711985104Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.711998008Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.712032352Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.712049254Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.712061948Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.712079681Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:32:09.717422 env[1054]: time="2024-02-09T19:32:09.712133953Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.712388320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.712469312Z" level=info msg="Connect containerd service" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.712518414Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713239356Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713311541Z" level=info msg="Start subscribing containerd event" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713348531Z" level=info msg="Start recovering state" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713409726Z" level=info msg="Start event monitor" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713422139Z" level=info msg="Start snapshots syncer" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713430845Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713438940Z" level=info msg="Start streaming server" Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713762537Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:32:09.717962 env[1054]: time="2024-02-09T19:32:09.713850843Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:32:09.738402 env[1054]: time="2024-02-09T19:32:09.738358717Z" level=info msg="containerd successfully booted in 0.239493s" Feb 9 19:32:09.753027 tar[1051]: ./vlan Feb 9 19:32:09.826792 tar[1051]: ./portmap Feb 9 19:32:09.884725 coreos-metadata[1035]: Feb 09 19:32:09.884 INFO Fetch successful Feb 9 19:32:09.884725 coreos-metadata[1035]: Feb 09 19:32:09.884 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 19:32:09.896464 tar[1051]: ./host-local Feb 9 19:32:09.900147 coreos-metadata[1035]: Feb 09 19:32:09.900 INFO Fetch successful Feb 9 19:32:09.906117 unknown[1035]: wrote ssh authorized keys file for user: core Feb 9 19:32:09.955039 update-ssh-keys[1104]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:32:09.938042 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:32:09.991374 tar[1051]: ./vrf Feb 9 19:32:10.052681 tar[1051]: ./bridge Feb 9 19:32:10.138621 tar[1051]: ./tuning Feb 9 19:32:10.203780 tar[1051]: ./firewall Feb 9 19:32:10.285800 tar[1051]: ./host-device Feb 9 19:32:10.360267 tar[1051]: ./sbr Feb 9 19:32:10.425498 tar[1051]: ./loopback Feb 9 19:32:10.489644 tar[1051]: ./dhcp Feb 9 19:32:10.567120 systemd[1]: Finished prepare-critools.service. Feb 9 19:32:10.580618 tar[1053]: linux-amd64/LICENSE Feb 9 19:32:10.580867 tar[1053]: linux-amd64/README.md Feb 9 19:32:10.584585 systemd[1]: Finished prepare-helm.service. Feb 9 19:32:10.629095 tar[1051]: ./ptp Feb 9 19:32:10.666249 tar[1051]: ./ipvlan Feb 9 19:32:10.701881 tar[1051]: ./bandwidth Feb 9 19:32:10.816861 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:32:10.927584 locksmithd[1100]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:32:11.464552 sshd_keygen[1069]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:32:11.504018 systemd[1]: Finished sshd-keygen.service. Feb 9 19:32:11.508308 systemd[1]: Starting issuegen.service... Feb 9 19:32:11.511710 systemd[1]: Started sshd@0-172.24.4.68:22-172.24.4.1:51696.service. Feb 9 19:32:11.521681 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:32:11.522109 systemd[1]: Finished issuegen.service. Feb 9 19:32:11.526436 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:32:11.568962 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:32:11.573415 systemd[1]: Started getty@tty1.service. Feb 9 19:32:11.577900 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:32:11.579680 systemd[1]: Reached target getty.target. Feb 9 19:32:11.580980 systemd[1]: Reached target multi-user.target. Feb 9 19:32:11.584770 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:32:11.602220 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:32:11.602601 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:32:11.605381 systemd[1]: Startup finished in 942ms (kernel) + 12.332s (initrd) + 10.977s (userspace) = 24.252s. Feb 9 19:32:13.247083 sshd[1122]: Accepted publickey for core from 172.24.4.1 port 51696 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:32:13.253436 sshd[1122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:13.277163 systemd[1]: Created slice user-500.slice. Feb 9 19:32:13.278939 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:32:13.281871 systemd-logind[1047]: New session 1 of user core. Feb 9 19:32:13.297361 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:32:13.300006 systemd[1]: Starting user@500.service... Feb 9 19:32:13.311320 (systemd)[1131]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:13.463843 systemd[1131]: Queued start job for default target default.target. Feb 9 19:32:13.464906 systemd[1131]: Reached target paths.target. Feb 9 19:32:13.465035 systemd[1131]: Reached target sockets.target. Feb 9 19:32:13.465120 systemd[1131]: Reached target timers.target. Feb 9 19:32:13.465208 systemd[1131]: Reached target basic.target. Feb 9 19:32:13.465326 systemd[1131]: Reached target default.target. Feb 9 19:32:13.465440 systemd[1131]: Startup finished in 139ms. Feb 9 19:32:13.465480 systemd[1]: Started user@500.service. Feb 9 19:32:13.467747 systemd[1]: Started session-1.scope. Feb 9 19:32:13.815793 systemd[1]: Started sshd@1-172.24.4.68:22-172.24.4.1:51712.service. Feb 9 19:32:15.310478 sshd[1140]: Accepted publickey for core from 172.24.4.1 port 51712 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:32:15.314791 sshd[1140]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:15.327855 systemd-logind[1047]: New session 2 of user core. Feb 9 19:32:15.329611 systemd[1]: Started session-2.scope. Feb 9 19:32:16.114357 sshd[1140]: pam_unix(sshd:session): session closed for user core Feb 9 19:32:16.120331 systemd[1]: Started sshd@2-172.24.4.68:22-172.24.4.1:40678.service. Feb 9 19:32:16.121496 systemd[1]: sshd@1-172.24.4.68:22-172.24.4.1:51712.service: Deactivated successfully. Feb 9 19:32:16.125091 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:32:16.127848 systemd-logind[1047]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:32:16.131257 systemd-logind[1047]: Removed session 2. Feb 9 19:32:17.694348 sshd[1145]: Accepted publickey for core from 172.24.4.1 port 40678 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:32:17.696980 sshd[1145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:17.707291 systemd-logind[1047]: New session 3 of user core. Feb 9 19:32:17.708197 systemd[1]: Started session-3.scope. Feb 9 19:32:18.350518 sshd[1145]: pam_unix(sshd:session): session closed for user core Feb 9 19:32:18.356905 systemd[1]: Started sshd@3-172.24.4.68:22-172.24.4.1:40686.service. Feb 9 19:32:18.362284 systemd[1]: sshd@2-172.24.4.68:22-172.24.4.1:40678.service: Deactivated successfully. Feb 9 19:32:18.363735 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:32:18.366378 systemd-logind[1047]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:32:18.368444 systemd-logind[1047]: Removed session 3. Feb 9 19:32:19.774150 sshd[1151]: Accepted publickey for core from 172.24.4.1 port 40686 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:32:19.777236 sshd[1151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:19.790167 systemd[1]: Started session-4.scope. Feb 9 19:32:19.792067 systemd-logind[1047]: New session 4 of user core. Feb 9 19:32:20.429440 sshd[1151]: pam_unix(sshd:session): session closed for user core Feb 9 19:32:20.434829 systemd[1]: sshd@3-172.24.4.68:22-172.24.4.1:40686.service: Deactivated successfully. Feb 9 19:32:20.436591 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:32:20.437857 systemd-logind[1047]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:32:20.441265 systemd[1]: Started sshd@4-172.24.4.68:22-172.24.4.1:40694.service. Feb 9 19:32:20.444580 systemd-logind[1047]: Removed session 4. Feb 9 19:32:22.083370 sshd[1158]: Accepted publickey for core from 172.24.4.1 port 40694 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:32:22.087353 sshd[1158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:22.098444 systemd-logind[1047]: New session 5 of user core. Feb 9 19:32:22.098495 systemd[1]: Started session-5.scope. Feb 9 19:32:22.606578 sudo[1161]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:32:22.607131 sudo[1161]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:32:22.620225 dbus-daemon[1036]: \xd0\xed\x8e\xd7\xf0U: received setenforce notice (enforcing=-975571200) Feb 9 19:32:22.624498 sudo[1161]: pam_unix(sudo:session): session closed for user root Feb 9 19:32:22.822907 sshd[1158]: pam_unix(sshd:session): session closed for user core Feb 9 19:32:22.832415 systemd[1]: Started sshd@5-172.24.4.68:22-172.24.4.1:40698.service. Feb 9 19:32:22.833870 systemd[1]: sshd@4-172.24.4.68:22-172.24.4.1:40694.service: Deactivated successfully. Feb 9 19:32:22.835704 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:32:22.841247 systemd-logind[1047]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:32:22.844737 systemd-logind[1047]: Removed session 5. Feb 9 19:32:24.930131 sshd[1164]: Accepted publickey for core from 172.24.4.1 port 40698 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:32:24.934756 sshd[1164]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:24.945204 systemd-logind[1047]: New session 6 of user core. Feb 9 19:32:24.946164 systemd[1]: Started session-6.scope. Feb 9 19:32:25.393520 sudo[1169]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:32:25.395712 sudo[1169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:32:25.403728 sudo[1169]: pam_unix(sudo:session): session closed for user root Feb 9 19:32:25.415522 sudo[1168]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:32:25.416052 sudo[1168]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:32:25.436008 systemd[1]: Stopping audit-rules.service... Feb 9 19:32:25.436000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:32:25.439333 auditctl[1172]: No rules Feb 9 19:32:25.440870 kernel: kauditd_printk_skb: 191 callbacks suppressed Feb 9 19:32:25.440999 kernel: audit: type=1305 audit(1707507145.436:175): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:32:25.441650 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:32:25.442003 systemd[1]: Stopped audit-rules.service. Feb 9 19:32:25.436000 audit[1172]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe86c19bf0 a2=420 a3=0 items=0 ppid=1 pid=1172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:25.445834 systemd[1]: Starting audit-rules.service... Feb 9 19:32:25.457270 kernel: audit: type=1300 audit(1707507145.436:175): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe86c19bf0 a2=420 a3=0 items=0 ppid=1 pid=1172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:25.436000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:32:25.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.470442 kernel: audit: type=1327 audit(1707507145.436:175): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:32:25.470589 kernel: audit: type=1131 audit(1707507145.440:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.494517 augenrules[1189]: No rules Feb 9 19:32:25.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.496080 systemd[1]: Finished audit-rules.service. Feb 9 19:32:25.497655 sudo[1168]: pam_unix(sudo:session): session closed for user root Feb 9 19:32:25.495000 audit[1168]: USER_END pid=1168 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.515222 kernel: audit: type=1130 audit(1707507145.494:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.515326 kernel: audit: type=1106 audit(1707507145.495:178): pid=1168 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.495000 audit[1168]: CRED_DISP pid=1168 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.519224 kernel: audit: type=1104 audit(1707507145.495:179): pid=1168 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.703450 sshd[1164]: pam_unix(sshd:session): session closed for user core Feb 9 19:32:25.725719 kernel: audit: type=1106 audit(1707507145.708:180): pid=1164 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:25.708000 audit[1164]: USER_END pid=1164 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:25.712110 systemd[1]: Started sshd@6-172.24.4.68:22-172.24.4.1:40728.service. Feb 9 19:32:25.726247 systemd[1]: sshd@5-172.24.4.68:22-172.24.4.1:40698.service: Deactivated successfully. Feb 9 19:32:25.728090 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:32:25.709000 audit[1164]: CRED_DISP pid=1164 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:25.739751 systemd-logind[1047]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:32:25.740404 kernel: audit: type=1104 audit(1707507145.709:181): pid=1164 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:25.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.68:22-172.24.4.1:40728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.751042 kernel: audit: type=1130 audit(1707507145.710:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.68:22-172.24.4.1:40728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.68:22-172.24.4.1:40698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:25.751335 systemd-logind[1047]: Removed session 6. Feb 9 19:32:26.890000 audit[1194]: USER_ACCT pid=1194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:26.892783 sshd[1194]: Accepted publickey for core from 172.24.4.1 port 40728 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:32:26.892000 audit[1194]: CRED_ACQ pid=1194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:26.893000 audit[1194]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ae7c720 a2=3 a3=0 items=0 ppid=1 pid=1194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:26.893000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:32:26.896230 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:32:26.906798 systemd-logind[1047]: New session 7 of user core. Feb 9 19:32:26.907585 systemd[1]: Started session-7.scope. Feb 9 19:32:26.918000 audit[1194]: USER_START pid=1194 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:26.922000 audit[1197]: CRED_ACQ pid=1197 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:32:27.430000 audit[1198]: USER_ACCT pid=1198 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:32:27.432992 sudo[1198]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:32:27.431000 audit[1198]: CRED_REFR pid=1198 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:32:27.434202 sudo[1198]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:32:27.437000 audit[1198]: USER_START pid=1198 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:32:28.472799 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:32:28.484537 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:32:28.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:28.485332 systemd[1]: Reached target network-online.target. Feb 9 19:32:28.488101 systemd[1]: Starting docker.service... Feb 9 19:32:28.538564 env[1214]: time="2024-02-09T19:32:28.538468999Z" level=info msg="Starting up" Feb 9 19:32:28.541819 env[1214]: time="2024-02-09T19:32:28.541762476Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:32:28.542046 env[1214]: time="2024-02-09T19:32:28.542008879Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:32:28.542289 env[1214]: time="2024-02-09T19:32:28.542243559Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:32:28.542446 env[1214]: time="2024-02-09T19:32:28.542413317Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:32:28.545194 env[1214]: time="2024-02-09T19:32:28.545151583Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:32:28.545365 env[1214]: time="2024-02-09T19:32:28.545332973Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:32:28.545536 env[1214]: time="2024-02-09T19:32:28.545497842Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:32:28.545671 env[1214]: time="2024-02-09T19:32:28.545640389Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:32:28.556043 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1264559862-merged.mount: Deactivated successfully. Feb 9 19:32:28.685820 env[1214]: time="2024-02-09T19:32:28.685729456Z" level=info msg="Loading containers: start." Feb 9 19:32:28.794000 audit[1246]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.794000 audit[1246]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe8638bde0 a2=0 a3=7ffe8638bdcc items=0 ppid=1214 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:32:28.799000 audit[1248]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.799000 audit[1248]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcaaff1fc0 a2=0 a3=7ffcaaff1fac items=0 ppid=1214 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:32:28.803000 audit[1250]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.803000 audit[1250]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefd4ab1a0 a2=0 a3=7ffefd4ab18c items=0 ppid=1214 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.803000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:32:28.807000 audit[1252]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.807000 audit[1252]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe103e1f50 a2=0 a3=7ffe103e1f3c items=0 ppid=1214 pid=1252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.807000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:32:28.813000 audit[1254]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.813000 audit[1254]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7f4d91f0 a2=0 a3=7ffe7f4d91dc items=0 ppid=1214 pid=1254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.813000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:32:28.834000 audit[1259]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.834000 audit[1259]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdeba7a050 a2=0 a3=7ffdeba7a03c items=0 ppid=1214 pid=1259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:32:28.850000 audit[1261]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.850000 audit[1261]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2a5e7f50 a2=0 a3=7ffc2a5e7f3c items=0 ppid=1214 pid=1261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.850000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:32:28.854000 audit[1263]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.854000 audit[1263]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff2ce60150 a2=0 a3=7fff2ce6013c items=0 ppid=1214 pid=1263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.854000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:32:28.857000 audit[1265]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.857000 audit[1265]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe196a70d0 a2=0 a3=7ffe196a70bc items=0 ppid=1214 pid=1265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.857000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:32:28.867000 audit[1269]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.867000 audit[1269]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffffc88dd50 a2=0 a3=7ffffc88dd3c items=0 ppid=1214 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.867000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:32:28.868000 audit[1270]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.868000 audit[1270]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe4a4b7fa0 a2=0 a3=7ffe4a4b7f8c items=0 ppid=1214 pid=1270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:32:28.889000 kernel: Initializing XFRM netlink socket Feb 9 19:32:28.934163 env[1214]: time="2024-02-09T19:32:28.934071863Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:32:28.990000 audit[1278]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:28.990000 audit[1278]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd0289a4e0 a2=0 a3=7ffd0289a4cc items=0 ppid=1214 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:28.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:32:29.013000 audit[1281]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.013000 audit[1281]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeda17c690 a2=0 a3=7ffeda17c67c items=0 ppid=1214 pid=1281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:32:29.021000 audit[1284]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.021000 audit[1284]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd6b76b680 a2=0 a3=7ffd6b76b66c items=0 ppid=1214 pid=1284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:32:29.026000 audit[1286]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.026000 audit[1286]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd00449840 a2=0 a3=7ffd0044982c items=0 ppid=1214 pid=1286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:32:29.031000 audit[1288]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.031000 audit[1288]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcb9b23830 a2=0 a3=7ffcb9b2381c items=0 ppid=1214 pid=1288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.031000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:32:29.037000 audit[1290]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.037000 audit[1290]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff1b4f2c10 a2=0 a3=7fff1b4f2bfc items=0 ppid=1214 pid=1290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.037000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:32:29.040000 audit[1292]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.040000 audit[1292]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff8fd66be0 a2=0 a3=7fff8fd66bcc items=0 ppid=1214 pid=1292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.040000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:32:29.062000 audit[1295]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.062000 audit[1295]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc491061a0 a2=0 a3=7ffc4910618c items=0 ppid=1214 pid=1295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.062000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:32:29.067000 audit[1297]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.067000 audit[1297]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffb62481f0 a2=0 a3=7fffb62481dc items=0 ppid=1214 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.067000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:32:29.070000 audit[1299]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.070000 audit[1299]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc70df4db0 a2=0 a3=7ffc70df4d9c items=0 ppid=1214 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.070000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:32:29.073000 audit[1301]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.073000 audit[1301]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd082ca9b0 a2=0 a3=7ffd082ca99c items=0 ppid=1214 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:32:29.076138 systemd-networkd[977]: docker0: Link UP Feb 9 19:32:29.089000 audit[1305]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.089000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0512d2b0 a2=0 a3=7ffd0512d29c items=0 ppid=1214 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:32:29.091000 audit[1306]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:32:29.091000 audit[1306]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeed8dc3f0 a2=0 a3=7ffeed8dc3dc items=0 ppid=1214 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:29.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:32:29.094385 env[1214]: time="2024-02-09T19:32:29.094320519Z" level=info msg="Loading containers: done." Feb 9 19:32:29.111404 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2360413188-merged.mount: Deactivated successfully. Feb 9 19:32:29.127611 env[1214]: time="2024-02-09T19:32:29.127542176Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:32:29.128359 env[1214]: time="2024-02-09T19:32:29.128309866Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:32:29.128792 env[1214]: time="2024-02-09T19:32:29.128750001Z" level=info msg="Daemon has completed initialization" Feb 9 19:32:29.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:29.171339 systemd[1]: Started docker.service. Feb 9 19:32:29.196557 env[1214]: time="2024-02-09T19:32:29.196467986Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:32:29.237808 systemd[1]: Reloading. Feb 9 19:32:29.371257 /usr/lib/systemd/system-generators/torcx-generator[1354]: time="2024-02-09T19:32:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:32:29.372402 /usr/lib/systemd/system-generators/torcx-generator[1354]: time="2024-02-09T19:32:29Z" level=info msg="torcx already run" Feb 9 19:32:29.454570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:32:29.454591 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:32:29.480279 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.550000 audit: BPF prog-id=37 op=LOAD Feb 9 19:32:29.550000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit: BPF prog-id=38 op=LOAD Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.551000 audit: BPF prog-id=39 op=LOAD Feb 9 19:32:29.551000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:32:29.551000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit: BPF prog-id=40 op=LOAD Feb 9 19:32:29.552000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit: BPF prog-id=41 op=LOAD Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.552000 audit: BPF prog-id=42 op=LOAD Feb 9 19:32:29.552000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:32:29.552000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit: BPF prog-id=43 op=LOAD Feb 9 19:32:29.555000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit: BPF prog-id=44 op=LOAD Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.555000 audit: BPF prog-id=45 op=LOAD Feb 9 19:32:29.555000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:32:29.555000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:32:29.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit: BPF prog-id=46 op=LOAD Feb 9 19:32:29.557000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.557000 audit: BPF prog-id=47 op=LOAD Feb 9 19:32:29.557000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit: BPF prog-id=48 op=LOAD Feb 9 19:32:29.558000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit: BPF prog-id=49 op=LOAD Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.558000 audit: BPF prog-id=50 op=LOAD Feb 9 19:32:29.558000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:32:29.558000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:29.560000 audit: BPF prog-id=51 op=LOAD Feb 9 19:32:29.560000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:32:29.584307 systemd[1]: Started kubelet.service. Feb 9 19:32:29.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:29.692776 kubelet[1400]: E0209 19:32:29.688649 1400 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:32:29.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:32:29.695284 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:32:29.695411 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:32:30.628087 env[1054]: time="2024-02-09T19:32:30.628020302Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 19:32:31.443161 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3695899094.mount: Deactivated successfully. Feb 9 19:32:34.501445 env[1054]: time="2024-02-09T19:32:34.501328751Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:34.506730 env[1054]: time="2024-02-09T19:32:34.506684376Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:34.519626 env[1054]: time="2024-02-09T19:32:34.519568670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:34.526090 env[1054]: time="2024-02-09T19:32:34.526006374Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:34.530530 env[1054]: time="2024-02-09T19:32:34.528748287Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 9 19:32:34.549598 env[1054]: time="2024-02-09T19:32:34.549544520Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 19:32:38.400895 env[1054]: time="2024-02-09T19:32:38.400777547Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:38.408096 env[1054]: time="2024-02-09T19:32:38.408039657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:38.411975 env[1054]: time="2024-02-09T19:32:38.411878837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:38.416309 env[1054]: time="2024-02-09T19:32:38.416247871Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:38.417901 env[1054]: time="2024-02-09T19:32:38.417815451Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 9 19:32:38.442496 env[1054]: time="2024-02-09T19:32:38.442417853Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 19:32:39.946262 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:32:39.956860 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 19:32:39.966242 kernel: audit: type=1130 audit(1707507159.944:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:39.966330 kernel: audit: type=1131 audit(1707507159.944:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:39.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:39.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:39.946514 systemd[1]: Stopped kubelet.service. Feb 9 19:32:39.948880 systemd[1]: Started kubelet.service. Feb 9 19:32:39.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:39.979150 kernel: audit: type=1130 audit(1707507159.947:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:40.067823 kubelet[1429]: E0209 19:32:40.067779 1429 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:32:40.071780 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:32:40.071928 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:32:40.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:32:40.076937 kernel: audit: type=1131 audit(1707507160.070:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:32:40.613712 env[1054]: time="2024-02-09T19:32:40.613618970Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:40.616455 env[1054]: time="2024-02-09T19:32:40.616402160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:40.619120 env[1054]: time="2024-02-09T19:32:40.619093938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:40.622388 env[1054]: time="2024-02-09T19:32:40.622362779Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:40.624451 env[1054]: time="2024-02-09T19:32:40.624386094Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 9 19:32:40.636179 env[1054]: time="2024-02-09T19:32:40.636123527Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:32:42.071413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1045310237.mount: Deactivated successfully. Feb 9 19:32:43.079544 env[1054]: time="2024-02-09T19:32:43.079442277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.081807 env[1054]: time="2024-02-09T19:32:43.081746705Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.083818 env[1054]: time="2024-02-09T19:32:43.083763972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.085844 env[1054]: time="2024-02-09T19:32:43.085791349Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.086882 env[1054]: time="2024-02-09T19:32:43.086815476Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:32:43.099402 env[1054]: time="2024-02-09T19:32:43.099350854Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:32:43.704274 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2006432965.mount: Deactivated successfully. Feb 9 19:32:43.716257 env[1054]: time="2024-02-09T19:32:43.716191258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.720884 env[1054]: time="2024-02-09T19:32:43.720822757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.725965 env[1054]: time="2024-02-09T19:32:43.725846514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.731025 env[1054]: time="2024-02-09T19:32:43.730952486Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:43.733430 env[1054]: time="2024-02-09T19:32:43.733317098Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:32:43.757025 env[1054]: time="2024-02-09T19:32:43.756907275Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 19:32:44.768152 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2815945631.mount: Deactivated successfully. Feb 9 19:32:50.230558 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 19:32:50.230970 systemd[1]: Stopped kubelet.service. Feb 9 19:32:50.250123 kernel: audit: type=1130 audit(1707507170.229:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:50.250259 kernel: audit: type=1131 audit(1707507170.229:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:50.250297 kernel: audit: type=1130 audit(1707507170.234:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:50.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:50.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:50.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:50.236480 systemd[1]: Started kubelet.service. Feb 9 19:32:50.339298 kubelet[1450]: E0209 19:32:50.339240 1450 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:32:50.480227 kernel: audit: type=1131 audit(1707507170.339:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:32:50.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:32:50.341271 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:32:50.341396 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:32:53.470517 env[1054]: time="2024-02-09T19:32:53.470356743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:53.479784 env[1054]: time="2024-02-09T19:32:53.479702695Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:53.485854 env[1054]: time="2024-02-09T19:32:53.485813017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:53.493286 env[1054]: time="2024-02-09T19:32:53.493257707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:53.494317 env[1054]: time="2024-02-09T19:32:53.494288473Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 9 19:32:53.532339 env[1054]: time="2024-02-09T19:32:53.532260649Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 19:32:54.287294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2130051443.mount: Deactivated successfully. Feb 9 19:32:54.378071 update_engine[1048]: I0209 19:32:54.377976 1048 update_attempter.cc:509] Updating boot flags... Feb 9 19:32:55.507268 env[1054]: time="2024-02-09T19:32:55.507197121Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:55.509582 env[1054]: time="2024-02-09T19:32:55.509530575Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:55.512185 env[1054]: time="2024-02-09T19:32:55.512138324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:55.515011 env[1054]: time="2024-02-09T19:32:55.514954074Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:32:55.516015 env[1054]: time="2024-02-09T19:32:55.515909880Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 9 19:32:59.438595 systemd[1]: Stopped kubelet.service. Feb 9 19:32:59.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.449706 kernel: audit: type=1130 audit(1707507179.438:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.449841 kernel: audit: type=1131 audit(1707507179.438:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.471243 systemd[1]: Reloading. Feb 9 19:32:59.560208 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2024-02-09T19:32:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:32:59.560238 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2024-02-09T19:32:59Z" level=info msg="torcx already run" Feb 9 19:32:59.646298 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:32:59.646317 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:32:59.671767 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749165 kernel: audit: type=1400 audit(1707507179.740:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749213 kernel: audit: type=1400 audit(1707507179.740:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.759063 kernel: audit: type=1400 audit(1707507179.740:404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.759273 kernel: audit: type=1400 audit(1707507179.740:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.759303 kernel: audit: type=1400 audit(1707507179.740:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762934 kernel: audit: type=1400 audit(1707507179.740:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771112 kernel: audit: type=1400 audit(1707507179.740:408): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771227 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit: BPF prog-id=52 op=LOAD Feb 9 19:32:59.748000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit: BPF prog-id=53 op=LOAD Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.749000 audit: BPF prog-id=54 op=LOAD Feb 9 19:32:59.749000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:32:59.749000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit: BPF prog-id=55 op=LOAD Feb 9 19:32:59.753000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit: BPF prog-id=56 op=LOAD Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.765000 audit: BPF prog-id=57 op=LOAD Feb 9 19:32:59.766000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:32:59.766000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:32:59.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit: BPF prog-id=58 op=LOAD Feb 9 19:32:59.771000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit: BPF prog-id=59 op=LOAD Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.771000 audit: BPF prog-id=60 op=LOAD Feb 9 19:32:59.771000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:32:59.771000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.772000 audit: BPF prog-id=61 op=LOAD Feb 9 19:32:59.772000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.773000 audit: BPF prog-id=62 op=LOAD Feb 9 19:32:59.773000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit: BPF prog-id=63 op=LOAD Feb 9 19:32:59.774000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit: BPF prog-id=64 op=LOAD Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.774000 audit: BPF prog-id=65 op=LOAD Feb 9 19:32:59.774000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:32:59.775000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:32:59.776000 audit: BPF prog-id=66 op=LOAD Feb 9 19:32:59.776000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:32:59.796773 systemd[1]: Started kubelet.service. Feb 9 19:32:59.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.874588 kubelet[1604]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:32:59.874949 kubelet[1604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:32:59.875159 kubelet[1604]: I0209 19:32:59.875124 1604 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:32:59.878281 kubelet[1604]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:32:59.878349 kubelet[1604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:33:00.475103 kubelet[1604]: I0209 19:33:00.475064 1604 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:33:00.475103 kubelet[1604]: I0209 19:33:00.475098 1604 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:33:00.475429 kubelet[1604]: I0209 19:33:00.475401 1604 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:33:00.483252 kubelet[1604]: I0209 19:33:00.483228 1604 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:33:00.485253 kubelet[1604]: E0209 19:33:00.485234 1604 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.68:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.485409 kubelet[1604]: I0209 19:33:00.485392 1604 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:33:00.485665 kubelet[1604]: I0209 19:33:00.485638 1604 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:33:00.485753 kubelet[1604]: I0209 19:33:00.485735 1604 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:33:00.485885 kubelet[1604]: I0209 19:33:00.485768 1604 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:33:00.485885 kubelet[1604]: I0209 19:33:00.485785 1604 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:33:00.486009 kubelet[1604]: I0209 19:33:00.485926 1604 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:33:00.489256 kubelet[1604]: I0209 19:33:00.489238 1604 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:33:00.489369 kubelet[1604]: I0209 19:33:00.489359 1604 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:33:00.489450 kubelet[1604]: I0209 19:33:00.489440 1604 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:33:00.489524 kubelet[1604]: I0209 19:33:00.489514 1604 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:33:00.490542 kubelet[1604]: W0209 19:33:00.490490 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.68:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-2-bf9c3542bb.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.490617 kubelet[1604]: E0209 19:33:00.490556 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.68:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-2-bf9c3542bb.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.490669 kubelet[1604]: I0209 19:33:00.490651 1604 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:33:00.491008 kubelet[1604]: W0209 19:33:00.490984 1604 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:33:00.491514 kubelet[1604]: I0209 19:33:00.491491 1604 server.go:1186] "Started kubelet" Feb 9 19:33:00.492000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:00.492000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:00.492000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a784e0 a1=c000a405e8 a2=c000a784b0 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.492000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:00.492000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:00.492000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:00.492000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bd0800 a1=c000a40600 a2=c000a78570 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.492000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:00.494309 kubelet[1604]: I0209 19:33:00.493650 1604 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:33:00.494309 kubelet[1604]: I0209 19:33:00.493699 1604 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:33:00.494309 kubelet[1604]: I0209 19:33:00.493779 1604 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:33:00.497657 kubelet[1604]: W0209 19:33:00.497618 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.68:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.497806 kubelet[1604]: E0209 19:33:00.497788 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.68:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.498047 kubelet[1604]: E0209 19:33:00.497954 1604 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe09f3ef5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 491456245, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 491456245, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.24.4.68:6443/api/v1/namespaces/default/events": dial tcp 172.24.4.68:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:33:00.498543 kubelet[1604]: E0209 19:33:00.498527 1604 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:33:00.498643 kubelet[1604]: E0209 19:33:00.498629 1604 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:33:00.500272 kubelet[1604]: I0209 19:33:00.500256 1604 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:33:00.499000 audit[1614]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.499000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd721408c0 a2=0 a3=7ffd721408ac items=0 ppid=1604 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:33:00.501362 kubelet[1604]: I0209 19:33:00.501339 1604 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:33:00.501629 kubelet[1604]: I0209 19:33:00.501612 1604 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:33:00.502000 audit[1615]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.502000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd15ff4f0 a2=0 a3=7ffdd15ff4dc items=0 ppid=1604 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:33:00.505000 audit[1617]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.505000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcb9350920 a2=0 a3=7ffcb935090c items=0 ppid=1604 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:33:00.506412 kubelet[1604]: I0209 19:33:00.503754 1604 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:33:00.507602 kubelet[1604]: W0209 19:33:00.507567 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.68:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.507710 kubelet[1604]: E0209 19:33:00.507699 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.68:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.507838 kubelet[1604]: E0209 19:33:00.507818 1604 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.24.4.68:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-2-bf9c3542bb.novalocal?timeout=10s": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.511000 audit[1619]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.511000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeda80da50 a2=0 a3=7ffeda80da3c items=0 ppid=1604 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:33:00.522000 audit[1623]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.522000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff7486cdb0 a2=0 a3=7fff7486cd9c items=0 ppid=1604 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:33:00.523000 audit[1624]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.523000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb30877d0 a2=0 a3=7ffdb30877bc items=0 ppid=1604 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:33:00.529000 audit[1627]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.529000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff761001e0 a2=0 a3=7fff761001cc items=0 ppid=1604 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:33:00.537000 audit[1630]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.537000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe4325a0a0 a2=0 a3=7ffe4325a08c items=0 ppid=1604 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:33:00.539000 audit[1631]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.539000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee4929f40 a2=0 a3=7ffee4929f2c items=0 ppid=1604 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:33:00.542000 audit[1632]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.542000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf544dc00 a2=0 a3=7ffdf544dbec items=0 ppid=1604 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:33:00.546000 audit[1634]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.546000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffedf227bf0 a2=0 a3=7ffedf227bdc items=0 ppid=1604 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:33:00.562000 audit[1639]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.562000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff52c45d90 a2=0 a3=7fff52c45d7c items=0 ppid=1604 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:33:00.567000 audit[1641]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.567000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc606a40a0 a2=0 a3=7ffc606a408c items=0 ppid=1604 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:33:00.569000 audit[1643]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.569000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffee62018c0 a2=0 a3=7ffee62018ac items=0 ppid=1604 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:33:00.572000 audit[1645]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.572000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffc4f296300 a2=0 a3=7ffc4f2962ec items=0 ppid=1604 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:33:00.573693 kubelet[1604]: I0209 19:33:00.573654 1604 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:33:00.573000 audit[1646]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.573000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1b650330 a2=0 a3=7ffd1b65031c items=0 ppid=1604 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:33:00.577000 audit[1647]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.577000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea47cb5d0 a2=0 a3=7ffea47cb5bc items=0 ppid=1604 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:33:00.578000 audit[1648]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.578000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcdaa74f70 a2=0 a3=7ffcdaa74f5c items=0 ppid=1604 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:33:00.581000 audit[1652]: NETFILTER_CFG table=nat:44 family=10 entries=1 op=nft_register_rule pid=1652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.581000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd45bb8150 a2=0 a3=7ffd45bb813c items=0 ppid=1604 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:33:00.582000 audit[1650]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.582000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef13840c0 a2=0 a3=7ffef13840ac items=0 ppid=1604 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:33:00.583000 audit[1653]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.583000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe32bf6a60 a2=0 a3=7ffe32bf6a4c items=0 ppid=1604 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:33:00.585000 audit[1656]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.585000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fffdc2de8a0 a2=0 a3=7fffdc2de88c items=0 ppid=1604 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:33:00.586000 audit[1654]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:00.586000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2772e5d0 a2=0 a3=7ffe2772e5bc items=0 ppid=1604 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:33:00.590267 kubelet[1604]: I0209 19:33:00.590249 1604 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:33:00.590397 kubelet[1604]: I0209 19:33:00.590386 1604 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:33:00.590477 kubelet[1604]: I0209 19:33:00.590467 1604 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:33:00.591000 audit[1657]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.591000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe0a7d4d90 a2=0 a3=7ffe0a7d4d7c items=0 ppid=1604 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:33:00.595000 audit[1658]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.595000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe650ba840 a2=0 a3=7ffe650ba82c items=0 ppid=1604 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:33:00.597000 audit[1660]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1660 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.597000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcdb3945c0 a2=0 a3=7ffcdb3945ac items=0 ppid=1604 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:33:00.599000 audit[1662]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.599000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd22b46c0 a2=0 a3=7fffd22b46ac items=0 ppid=1604 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:33:00.603377 kubelet[1604]: I0209 19:33:00.603359 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:00.603788 kubelet[1604]: E0209 19:33:00.603774 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.68:6443/api/v1/nodes\": dial tcp 172.24.4.68:6443: connect: connection refused" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:00.604000 audit[1664]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.604000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffeecec4300 a2=0 a3=7ffeecec42ec items=0 ppid=1604 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:33:00.607000 audit[1666]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1666 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.607000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff1f205480 a2=0 a3=7fff1f20546c items=0 ppid=1604 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:33:00.650000 audit[1668]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.650000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd4197e460 a2=0 a3=7ffd4197e44c items=0 ppid=1604 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:33:00.652466 kubelet[1604]: I0209 19:33:00.652427 1604 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:33:00.652708 kubelet[1604]: I0209 19:33:00.652675 1604 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:33:00.652984 kubelet[1604]: I0209 19:33:00.652907 1604 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:33:00.653294 kubelet[1604]: E0209 19:33:00.653261 1604 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:33:00.654552 kubelet[1604]: W0209 19:33:00.654494 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.68:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.654814 kubelet[1604]: E0209 19:33:00.654782 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.68:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.656000 audit[1669]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.656000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea06a9c30 a2=0 a3=7ffea06a9c1c items=0 ppid=1604 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:33:00.659000 audit[1670]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.659000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1735e860 a2=0 a3=7fff1735e84c items=0 ppid=1604 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:33:00.662000 audit[1671]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:00.662000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee115e680 a2=0 a3=7ffee115e66c items=0 ppid=1604 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:33:00.664895 kubelet[1604]: I0209 19:33:00.664858 1604 policy_none.go:49] "None policy: Start" Feb 9 19:33:00.667231 kubelet[1604]: I0209 19:33:00.667196 1604 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:33:00.667459 kubelet[1604]: I0209 19:33:00.667432 1604 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:33:00.709742 kubelet[1604]: E0209 19:33:00.709637 1604 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.24.4.68:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-2-bf9c3542bb.novalocal?timeout=10s": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:00.757230 kubelet[1604]: E0209 19:33:00.754054 1604 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:33:00.807550 kubelet[1604]: I0209 19:33:00.807492 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:00.808145 kubelet[1604]: E0209 19:33:00.808111 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.68:6443/api/v1/nodes\": dial tcp 172.24.4.68:6443: connect: connection refused" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:00.868359 systemd[1]: Created slice kubepods.slice. Feb 9 19:33:00.877572 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:33:00.884761 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:33:00.892139 kubelet[1604]: I0209 19:33:00.892104 1604 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:33:00.891000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:00.891000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:00.891000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ed9770 a1=c000ca0c18 a2=c000ed9740 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:00.891000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:00.893471 kubelet[1604]: I0209 19:33:00.893446 1604 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:33:00.893904 kubelet[1604]: I0209 19:33:00.893876 1604 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:33:00.896349 kubelet[1604]: E0209 19:33:00.896317 1604 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-2-bf9c3542bb.novalocal\" not found" Feb 9 19:33:00.954511 kubelet[1604]: I0209 19:33:00.954420 1604 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:00.957430 kubelet[1604]: I0209 19:33:00.957370 1604 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:00.960345 kubelet[1604]: I0209 19:33:00.960295 1604 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:00.962809 kubelet[1604]: I0209 19:33:00.962768 1604 status_manager.go:698] "Failed to get status for pod" podUID=8bd4f6738192d66a03a62c5682830309 pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" err="Get \"https://172.24.4.68:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\": dial tcp 172.24.4.68:6443: connect: connection refused" Feb 9 19:33:00.974865 systemd[1]: Created slice kubepods-burstable-pod8bd4f6738192d66a03a62c5682830309.slice. Feb 9 19:33:00.979744 kubelet[1604]: I0209 19:33:00.979711 1604 status_manager.go:698] "Failed to get status for pod" podUID=119492cfcd2cc10f61551e5511fe4aee pod="kube-system/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal" err="Get \"https://172.24.4.68:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal\": dial tcp 172.24.4.68:6443: connect: connection refused" Feb 9 19:33:00.981883 kubelet[1604]: I0209 19:33:00.981833 1604 status_manager.go:698] "Failed to get status for pod" podUID=c1aacc04a1294f6171ab3c9c546750b1 pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" err="Get \"https://172.24.4.68:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\": dial tcp 172.24.4.68:6443: connect: connection refused" Feb 9 19:33:00.992748 systemd[1]: Created slice kubepods-burstable-pod119492cfcd2cc10f61551e5511fe4aee.slice. Feb 9 19:33:01.002005 systemd[1]: Created slice kubepods-burstable-podc1aacc04a1294f6171ab3c9c546750b1.slice. Feb 9 19:33:01.006806 kubelet[1604]: I0209 19:33:01.006768 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.007030 kubelet[1604]: I0209 19:33:01.006868 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.007030 kubelet[1604]: I0209 19:33:01.006998 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.007172 kubelet[1604]: I0209 19:33:01.007082 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.007172 kubelet[1604]: I0209 19:33:01.007156 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.007371 kubelet[1604]: I0209 19:33:01.007218 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c1aacc04a1294f6171ab3c9c546750b1-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"c1aacc04a1294f6171ab3c9c546750b1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.007371 kubelet[1604]: I0209 19:33:01.007294 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c1aacc04a1294f6171ab3c9c546750b1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"c1aacc04a1294f6171ab3c9c546750b1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.009335 kubelet[1604]: I0209 19:33:01.009158 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/119492cfcd2cc10f61551e5511fe4aee-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"119492cfcd2cc10f61551e5511fe4aee\") " pod="kube-system/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.009741 kubelet[1604]: I0209 19:33:01.009708 1604 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c1aacc04a1294f6171ab3c9c546750b1-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"c1aacc04a1294f6171ab3c9c546750b1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.111309 kubelet[1604]: E0209 19:33:01.111267 1604 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.24.4.68:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-2-bf9c3542bb.novalocal?timeout=10s": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.212629 kubelet[1604]: I0209 19:33:01.212565 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.214018 kubelet[1604]: E0209 19:33:01.213972 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.68:6443/api/v1/nodes\": dial tcp 172.24.4.68:6443: connect: connection refused" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:01.289781 env[1054]: time="2024-02-09T19:33:01.289529407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal,Uid:8bd4f6738192d66a03a62c5682830309,Namespace:kube-system,Attempt:0,}" Feb 9 19:33:01.304725 env[1054]: time="2024-02-09T19:33:01.304412021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal,Uid:119492cfcd2cc10f61551e5511fe4aee,Namespace:kube-system,Attempt:0,}" Feb 9 19:33:01.307214 env[1054]: time="2024-02-09T19:33:01.307051588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal,Uid:c1aacc04a1294f6171ab3c9c546750b1,Namespace:kube-system,Attempt:0,}" Feb 9 19:33:01.468289 kubelet[1604]: W0209 19:33:01.468139 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.68:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.468289 kubelet[1604]: E0209 19:33:01.468251 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.68:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.635312 kubelet[1604]: W0209 19:33:01.634549 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.68:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.635312 kubelet[1604]: E0209 19:33:01.634643 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.68:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.756454 kubelet[1604]: W0209 19:33:01.756248 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.68:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.756454 kubelet[1604]: E0209 19:33:01.756396 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.68:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.810594 kubelet[1604]: W0209 19:33:01.810407 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.68:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-2-bf9c3542bb.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.810594 kubelet[1604]: E0209 19:33:01.810546 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.68:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-2-bf9c3542bb.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:01.914333 kubelet[1604]: E0209 19:33:01.913239 1604 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.24.4.68:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-2-bf9c3542bb.novalocal?timeout=10s": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:02.018346 kubelet[1604]: I0209 19:33:02.017764 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:02.018617 kubelet[1604]: E0209 19:33:02.018508 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.68:6443/api/v1/nodes\": dial tcp 172.24.4.68:6443: connect: connection refused" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:02.131732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1635410910.mount: Deactivated successfully. Feb 9 19:33:02.162286 env[1054]: time="2024-02-09T19:33:02.162197578Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.178056 env[1054]: time="2024-02-09T19:33:02.176548292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.183286 env[1054]: time="2024-02-09T19:33:02.183163793Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.189992 env[1054]: time="2024-02-09T19:33:02.189882618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.199483 env[1054]: time="2024-02-09T19:33:02.199360804Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.204108 env[1054]: time="2024-02-09T19:33:02.203886631Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.213435 env[1054]: time="2024-02-09T19:33:02.213340021Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.219092 env[1054]: time="2024-02-09T19:33:02.218993525Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.224405 env[1054]: time="2024-02-09T19:33:02.224322180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.234565 env[1054]: time="2024-02-09T19:33:02.234486343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.248711 env[1054]: time="2024-02-09T19:33:02.248638765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.259506 env[1054]: time="2024-02-09T19:33:02.259430868Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:02.343981 env[1054]: time="2024-02-09T19:33:02.343719384Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:02.343981 env[1054]: time="2024-02-09T19:33:02.343855619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:02.344970 env[1054]: time="2024-02-09T19:33:02.344830640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:02.346348 env[1054]: time="2024-02-09T19:33:02.346223946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85551b6756263218bf6ee1f72537a0adc69860c0d2dc3ad7f68b466beb4b0671 pid=1680 runtime=io.containerd.runc.v2 Feb 9 19:33:02.365200 env[1054]: time="2024-02-09T19:33:02.364987396Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:02.368269 env[1054]: time="2024-02-09T19:33:02.365129983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:02.368269 env[1054]: time="2024-02-09T19:33:02.365494518Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:02.368269 env[1054]: time="2024-02-09T19:33:02.367242058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4113786e74eb9552390a2579eef8e052580a3b1712e9f38fd14ebda4e790cf36 pid=1693 runtime=io.containerd.runc.v2 Feb 9 19:33:02.387291 systemd[1]: Started cri-containerd-85551b6756263218bf6ee1f72537a0adc69860c0d2dc3ad7f68b466beb4b0671.scope. Feb 9 19:33:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.411000 audit: BPF prog-id=67 op=LOAD Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1680 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353531623637353632363332313862663665653166373235333761 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1680 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353531623637353632363332313862663665653166373235333761 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.413000 audit: BPF prog-id=68 op=LOAD Feb 9 19:33:02.413000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000323740 items=0 ppid=1680 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353531623637353632363332313862663665653166373235333761 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit: BPF prog-id=69 op=LOAD Feb 9 19:33:02.414000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000323788 items=0 ppid=1680 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353531623637353632363332313862663665653166373235333761 Feb 9 19:33:02.414000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:33:02.414000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.414000 audit: BPF prog-id=70 op=LOAD Feb 9 19:33:02.414000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000323b98 items=0 ppid=1680 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353531623637353632363332313862663665653166373235333761 Feb 9 19:33:02.423279 systemd[1]: Started cri-containerd-4113786e74eb9552390a2579eef8e052580a3b1712e9f38fd14ebda4e790cf36.scope. Feb 9 19:33:02.434863 env[1054]: time="2024-02-09T19:33:02.434681929Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:02.434863 env[1054]: time="2024-02-09T19:33:02.434780626Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:02.434863 env[1054]: time="2024-02-09T19:33:02.434810642Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:02.435101 env[1054]: time="2024-02-09T19:33:02.435011298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab317b0ea5afc0a9604a8da1990ed61b3928650627dd05482ce713eb4a3e7ae4 pid=1737 runtime=io.containerd.runc.v2 Feb 9 19:33:02.454446 systemd[1]: Started cri-containerd-ab317b0ea5afc0a9604a8da1990ed61b3928650627dd05482ce713eb4a3e7ae4.scope. Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.465000 audit: BPF prog-id=71 op=LOAD Feb 9 19:33:02.472000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.472000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1693 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313337383665373465623935353233393061323537396565663865 Feb 9 19:33:02.472000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.472000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1693 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313337383665373465623935353233393061323537396565663865 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.474000 audit: BPF prog-id=72 op=LOAD Feb 9 19:33:02.474000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000380d80 items=0 ppid=1693 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313337383665373465623935353233393061323537396565663865 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.476000 audit: BPF prog-id=73 op=LOAD Feb 9 19:33:02.476000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000380dc8 items=0 ppid=1693 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313337383665373465623935353233393061323537396565663865 Feb 9 19:33:02.477000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:33:02.477000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.477000 audit: BPF prog-id=74 op=LOAD Feb 9 19:33:02.477000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003811d8 items=0 ppid=1693 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313337383665373465623935353233393061323537396565663865 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.488000 audit: BPF prog-id=75 op=LOAD Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1737 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333137623065613561666330613936303461386461313939306564 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1737 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333137623065613561666330613936303461386461313939306564 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.492000 audit: BPF prog-id=76 op=LOAD Feb 9 19:33:02.492000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292510 items=0 ppid=1737 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333137623065613561666330613936303461386461313939306564 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.494000 audit: BPF prog-id=77 op=LOAD Feb 9 19:33:02.494000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000292558 items=0 ppid=1737 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333137623065613561666330613936303461386461313939306564 Feb 9 19:33:02.494000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:33:02.495000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.495000 audit: BPF prog-id=78 op=LOAD Feb 9 19:33:02.495000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000292968 items=0 ppid=1737 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333137623065613561666330613936303461386461313939306564 Feb 9 19:33:02.520083 env[1054]: time="2024-02-09T19:33:02.519968399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal,Uid:119492cfcd2cc10f61551e5511fe4aee,Namespace:kube-system,Attempt:0,} returns sandbox id \"85551b6756263218bf6ee1f72537a0adc69860c0d2dc3ad7f68b466beb4b0671\"" Feb 9 19:33:02.524888 env[1054]: time="2024-02-09T19:33:02.524300753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal,Uid:c1aacc04a1294f6171ab3c9c546750b1,Namespace:kube-system,Attempt:0,} returns sandbox id \"4113786e74eb9552390a2579eef8e052580a3b1712e9f38fd14ebda4e790cf36\"" Feb 9 19:33:02.526510 env[1054]: time="2024-02-09T19:33:02.526460568Z" level=info msg="CreateContainer within sandbox \"85551b6756263218bf6ee1f72537a0adc69860c0d2dc3ad7f68b466beb4b0671\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:33:02.531426 env[1054]: time="2024-02-09T19:33:02.530437796Z" level=info msg="CreateContainer within sandbox \"4113786e74eb9552390a2579eef8e052580a3b1712e9f38fd14ebda4e790cf36\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:33:02.543186 env[1054]: time="2024-02-09T19:33:02.543133894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal,Uid:8bd4f6738192d66a03a62c5682830309,Namespace:kube-system,Attempt:0,} returns sandbox id \"ab317b0ea5afc0a9604a8da1990ed61b3928650627dd05482ce713eb4a3e7ae4\"" Feb 9 19:33:02.546555 env[1054]: time="2024-02-09T19:33:02.546523598Z" level=info msg="CreateContainer within sandbox \"ab317b0ea5afc0a9604a8da1990ed61b3928650627dd05482ce713eb4a3e7ae4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:33:02.599275 kubelet[1604]: E0209 19:33:02.599217 1604 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.68:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:02.769707 env[1054]: time="2024-02-09T19:33:02.769563445Z" level=info msg="CreateContainer within sandbox \"ab317b0ea5afc0a9604a8da1990ed61b3928650627dd05482ce713eb4a3e7ae4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4484c7522c8a92d464ea83a16bc85b445b5515a75051dd1975498326a5f35b76\"" Feb 9 19:33:02.771422 env[1054]: time="2024-02-09T19:33:02.771320003Z" level=info msg="StartContainer for \"4484c7522c8a92d464ea83a16bc85b445b5515a75051dd1975498326a5f35b76\"" Feb 9 19:33:02.810748 systemd[1]: Started cri-containerd-4484c7522c8a92d464ea83a16bc85b445b5515a75051dd1975498326a5f35b76.scope. Feb 9 19:33:02.823850 env[1054]: time="2024-02-09T19:33:02.823759411Z" level=info msg="CreateContainer within sandbox \"4113786e74eb9552390a2579eef8e052580a3b1712e9f38fd14ebda4e790cf36\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9cbbe10764a2b260b4157bd1e3824c12eda508f4f88d5f5c9436c8c114e7823f\"" Feb 9 19:33:02.832278 env[1054]: time="2024-02-09T19:33:02.832214655Z" level=info msg="StartContainer for \"9cbbe10764a2b260b4157bd1e3824c12eda508f4f88d5f5c9436c8c114e7823f\"" Feb 9 19:33:02.840147 env[1054]: time="2024-02-09T19:33:02.840050558Z" level=info msg="CreateContainer within sandbox \"85551b6756263218bf6ee1f72537a0adc69860c0d2dc3ad7f68b466beb4b0671\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"53d0953a53892c57174e8f368fe91f0e32b870f3d8cece809da720735ccbc154\"" Feb 9 19:33:02.841412 env[1054]: time="2024-02-09T19:33:02.841354887Z" level=info msg="StartContainer for \"53d0953a53892c57174e8f368fe91f0e32b870f3d8cece809da720735ccbc154\"" Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.847000 audit: BPF prog-id=79 op=LOAD Feb 9 19:33:02.849000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.849000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1737 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434383463373532326338613932643436346561383361313662633835 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1737 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434383463373532326338613932643436346561383361313662633835 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.850000 audit: BPF prog-id=80 op=LOAD Feb 9 19:33:02.850000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003917e0 items=0 ppid=1737 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434383463373532326338613932643436346561383361313662633835 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.851000 audit: BPF prog-id=81 op=LOAD Feb 9 19:33:02.851000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000391828 items=0 ppid=1737 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434383463373532326338613932643436346561383361313662633835 Feb 9 19:33:02.852000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:33:02.852000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.852000 audit: BPF prog-id=82 op=LOAD Feb 9 19:33:02.852000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000391c38 items=0 ppid=1737 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434383463373532326338613932643436346561383361313662633835 Feb 9 19:33:02.871629 systemd[1]: Started cri-containerd-53d0953a53892c57174e8f368fe91f0e32b870f3d8cece809da720735ccbc154.scope. Feb 9 19:33:02.891629 systemd[1]: Started cri-containerd-9cbbe10764a2b260b4157bd1e3824c12eda508f4f88d5f5c9436c8c114e7823f.scope. Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.910000 audit: BPF prog-id=83 op=LOAD Feb 9 19:33:02.914000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.914000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1680 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533643039353361353338393263353731373465386633363866653931 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1680 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533643039353361353338393263353731373465386633363866653931 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.915000 audit: BPF prog-id=84 op=LOAD Feb 9 19:33:02.915000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d00c0 items=0 ppid=1680 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533643039353361353338393263353731373465386633363866653931 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.918000 audit: BPF prog-id=85 op=LOAD Feb 9 19:33:02.918000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d0108 items=0 ppid=1680 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533643039353361353338393263353731373465386633363866653931 Feb 9 19:33:02.920000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:33:02.920000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.920000 audit: BPF prog-id=86 op=LOAD Feb 9 19:33:02.920000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d0518 items=0 ppid=1680 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533643039353361353338393263353731373465386633363866653931 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.929000 audit: BPF prog-id=87 op=LOAD Feb 9 19:33:02.931000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.931000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1693 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963626265313037363461326232363062343135376264316533383234 Feb 9 19:33:02.932000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.932000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1693 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963626265313037363461326232363062343135376264316533383234 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit: BPF prog-id=88 op=LOAD Feb 9 19:33:02.935000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000305710 items=0 ppid=1693 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963626265313037363461326232363062343135376264316533383234 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.935000 audit: BPF prog-id=89 op=LOAD Feb 9 19:33:02.935000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000305758 items=0 ppid=1693 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963626265313037363461326232363062343135376264316533383234 Feb 9 19:33:02.936000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:33:02.936000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:02.936000 audit: BPF prog-id=90 op=LOAD Feb 9 19:33:02.936000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000305b68 items=0 ppid=1693 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:02.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963626265313037363461326232363062343135376264316533383234 Feb 9 19:33:02.961243 env[1054]: time="2024-02-09T19:33:02.961144867Z" level=info msg="StartContainer for \"4484c7522c8a92d464ea83a16bc85b445b5515a75051dd1975498326a5f35b76\" returns successfully" Feb 9 19:33:03.004691 env[1054]: time="2024-02-09T19:33:03.004590438Z" level=info msg="StartContainer for \"53d0953a53892c57174e8f368fe91f0e32b870f3d8cece809da720735ccbc154\" returns successfully" Feb 9 19:33:03.034408 env[1054]: time="2024-02-09T19:33:03.034285569Z" level=info msg="StartContainer for \"9cbbe10764a2b260b4157bd1e3824c12eda508f4f88d5f5c9436c8c114e7823f\" returns successfully" Feb 9 19:33:03.343698 kubelet[1604]: W0209 19:33:03.343577 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.68:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:03.344171 kubelet[1604]: E0209 19:33:03.344149 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.68:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:03.514403 kubelet[1604]: E0209 19:33:03.514358 1604 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://172.24.4.68:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-2-bf9c3542bb.novalocal?timeout=10s": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:03.529135 kubelet[1604]: W0209 19:33:03.529109 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.68:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:03.529275 kubelet[1604]: E0209 19:33:03.529244 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.68:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:03.620509 kubelet[1604]: I0209 19:33:03.620413 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:03.621045 kubelet[1604]: E0209 19:33:03.621030 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.68:6443/api/v1/nodes\": dial tcp 172.24.4.68:6443: connect: connection refused" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:03.676978 kubelet[1604]: I0209 19:33:03.676956 1604 status_manager.go:698] "Failed to get status for pod" podUID=c1aacc04a1294f6171ab3c9c546750b1 pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" err="Get \"https://172.24.4.68:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\": dial tcp 172.24.4.68:6443: connect: connection refused" Feb 9 19:33:03.678218 kubelet[1604]: I0209 19:33:03.678202 1604 status_manager.go:698] "Failed to get status for pod" podUID=8bd4f6738192d66a03a62c5682830309 pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" err="Get \"https://172.24.4.68:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\": dial tcp 172.24.4.68:6443: connect: connection refused" Feb 9 19:33:03.679240 kubelet[1604]: I0209 19:33:03.679214 1604 status_manager.go:698] "Failed to get status for pod" podUID=119492cfcd2cc10f61551e5511fe4aee pod="kube-system/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal" err="Get \"https://172.24.4.68:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal\": dial tcp 172.24.4.68:6443: connect: connection refused" Feb 9 19:33:03.857692 kubelet[1604]: W0209 19:33:03.857659 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.68:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-2-bf9c3542bb.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:03.857880 kubelet[1604]: E0209 19:33:03.857866 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.68:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-2-bf9c3542bb.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:04.365000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:04.365000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004b81e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:04.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:04.366000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:04.366000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dc4040 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:04.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:04.685976 kubelet[1604]: W0209 19:33:04.685747 1604 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.68:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:04.685976 kubelet[1604]: E0209 19:33:04.685841 1604 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.68:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.68:6443: connect: connection refused Feb 9 19:33:06.824062 kubelet[1604]: I0209 19:33:06.824016 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:07.471514 kernel: kauditd_printk_skb: 626 callbacks suppressed Feb 9 19:33:07.471826 kernel: audit: type=1400 audit(1707507187.456:720): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.456000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.458000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.486977 kernel: audit: type=1400 audit(1707507187.458:721): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.458000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c00b855a10 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.502950 kernel: audit: type=1300 audit(1707507187.458:721): arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c00b855a10 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.516950 kernel: audit: type=1327 audit(1707507187.458:721): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.456000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006bea000 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.542945 kernel: audit: type=1300 audit(1707507187.456:720): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006bea000 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.551938 kernel: audit: type=1327 audit(1707507187.456:720): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.458000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.558943 kernel: audit: type=1400 audit(1707507187.458:722): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.458000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0029240a0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.566937 kernel: audit: type=1300 audit(1707507187.458:722): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0029240a0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.573952 kernel: audit: type=1327 audit(1707507187.458:722): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.473000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.580937 kernel: audit: type=1400 audit(1707507187.473:723): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.473000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c006beb6e0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.518000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.518000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c002925a60 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.518000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.534000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:07.534000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00bb3a030 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:33:07.534000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:33:07.798074 kubelet[1604]: E0209 19:33:07.798048 1604 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-2-bf9c3542bb.novalocal\" not found" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:07.924806 kubelet[1604]: I0209 19:33:07.924740 1604 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:08.502131 kubelet[1604]: I0209 19:33:08.502080 1604 apiserver.go:52] "Watching apiserver" Feb 9 19:33:08.604298 kubelet[1604]: I0209 19:33:08.604200 1604 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:33:08.656151 kubelet[1604]: I0209 19:33:08.656081 1604 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:33:08.860128 kubelet[1604]: E0209 19:33:08.859779 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe09f3ef5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 491456245, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 491456245, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:09.268607 kubelet[1604]: E0209 19:33:09.268370 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe10c7e29", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 498615849, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 498615849, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:09.705556 kubelet[1604]: E0209 19:33:09.705190 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe67026cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589033167, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589033167, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:09.874419 kubelet[1604]: E0209 19:33:09.874071 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6703d3c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589038908, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589038908, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:09.933696 kubelet[1604]: E0209 19:33:09.933371 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6704b85", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589042565, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589042565, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:10.101246 kubelet[1604]: E0209 19:33:10.101054 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe67026cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589033167, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 603302143, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:10.169555 kubelet[1604]: E0209 19:33:10.169315 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6703d3c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589038908, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 603307543, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:10.244885 kubelet[1604]: E0209 19:33:10.244433 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6704b85", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589042565, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 603310639, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:10.325809 kubelet[1604]: E0209 19:33:10.325633 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe67026cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589033167, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 807400142, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:10.403546 kubelet[1604]: E0209 19:33:10.403256 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6703d3c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589038908, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 807426502, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:10.574420 kubelet[1604]: E0209 19:33:10.574103 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6704b85", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589042565, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 807434727, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:10.763658 kubelet[1604]: E0209 19:33:10.763469 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbf8e6aa27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 898789927, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 898789927, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:11.193683 kubelet[1604]: E0209 19:33:11.193313 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe67026cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589033167, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 957154854, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:11.611457 kubelet[1604]: E0209 19:33:11.611121 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6703d3c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589038908, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 957178369, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:12.129044 kubelet[1604]: E0209 19:33:12.128789 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe6704b85", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589042565, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 957187786, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:12.378218 kubelet[1604]: E0209 19:33:12.378092 1604 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-2-bf9c3542bb.novalocal.17b248bbe67026cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-2-bf9c3542bb.novalocal", UID:"ci-3510-3-2-2-bf9c3542bb.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-2-bf9c3542bb.novalocal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-2-bf9c3542bb.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 589033167, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 0, 960184834, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:33:12.732006 kubelet[1604]: I0209 19:33:12.731905 1604 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" podStartSLOduration=0.731796987 pod.CreationTimestamp="2024-02-09 19:33:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:33:12.473074065 +0000 UTC m=+12.672541607" watchObservedRunningTime="2024-02-09 19:33:12.731796987 +0000 UTC m=+12.931264519" Feb 9 19:33:13.705251 systemd[1]: Reloading. Feb 9 19:33:13.822414 /usr/lib/systemd/system-generators/torcx-generator[1928]: time="2024-02-09T19:33:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:33:13.824002 /usr/lib/systemd/system-generators/torcx-generator[1928]: time="2024-02-09T19:33:13Z" level=info msg="torcx already run" Feb 9 19:33:13.917827 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:33:13.917847 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:33:13.950384 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:33:14.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.080166 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 9 19:33:14.080226 kernel: audit: type=1400 audit(1707507194.076:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.094601 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:33:14.094694 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:33:14.094720 kernel: audit: backlog limit exceeded Feb 9 19:33:14.097637 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:33:14.097693 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:33:14.097718 kernel: audit: type=1400 audit(1707507194.076:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.097744 kernel: audit: backlog limit exceeded Feb 9 19:33:14.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.110133 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:33:14.110223 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:33:14.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.086000 audit: BPF prog-id=91 op=LOAD Feb 9 19:33:14.086000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.087000 audit: BPF prog-id=92 op=LOAD Feb 9 19:33:14.087000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit: BPF prog-id=93 op=LOAD Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.088000 audit: BPF prog-id=94 op=LOAD Feb 9 19:33:14.088000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:33:14.088000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit: BPF prog-id=95 op=LOAD Feb 9 19:33:14.089000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.118000 audit: BPF prog-id=103 op=LOAD Feb 9 19:33:14.118000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit: BPF prog-id=104 op=LOAD Feb 9 19:33:14.119000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit: BPF prog-id=105 op=LOAD Feb 9 19:33:14.121000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit: BPF prog-id=106 op=LOAD Feb 9 19:33:14.121000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit: BPF prog-id=107 op=LOAD Feb 9 19:33:14.122000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit: BPF prog-id=108 op=LOAD Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.122000 audit: BPF prog-id=109 op=LOAD Feb 9 19:33:14.122000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:33:14.122000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.123000 audit: BPF prog-id=110 op=LOAD Feb 9 19:33:14.123000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.124000 audit: BPF prog-id=111 op=LOAD Feb 9 19:33:14.124000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:33:14.150171 systemd[1]: Stopping kubelet.service... Feb 9 19:33:14.165293 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:33:14.165492 systemd[1]: Stopped kubelet.service. Feb 9 19:33:14.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:14.165557 systemd[1]: kubelet.service: Consumed 1.471s CPU time. Feb 9 19:33:14.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:14.168159 systemd[1]: Started kubelet.service. Feb 9 19:33:14.295000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525099 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:33:14.295000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cd6240 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:14.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:14.566297 kubelet[1975]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:33:14.566689 kubelet[1975]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:33:14.566861 kubelet[1975]: I0209 19:33:14.566833 1975 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:33:14.568852 kubelet[1975]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:33:14.568972 kubelet[1975]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:33:14.574483 kubelet[1975]: I0209 19:33:14.574434 1975 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:33:14.574483 kubelet[1975]: I0209 19:33:14.574463 1975 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:33:14.574694 kubelet[1975]: I0209 19:33:14.574688 1975 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:33:14.576208 kubelet[1975]: I0209 19:33:14.576186 1975 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:33:14.578066 kubelet[1975]: I0209 19:33:14.578048 1975 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:33:14.582908 kubelet[1975]: I0209 19:33:14.582840 1975 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:33:14.583152 kubelet[1975]: I0209 19:33:14.583140 1975 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:33:14.583230 kubelet[1975]: I0209 19:33:14.583218 1975 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:33:14.583355 kubelet[1975]: I0209 19:33:14.583239 1975 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:33:14.583355 kubelet[1975]: I0209 19:33:14.583253 1975 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:33:14.583355 kubelet[1975]: I0209 19:33:14.583288 1975 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:33:14.592318 kubelet[1975]: I0209 19:33:14.592254 1975 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:33:14.592705 kubelet[1975]: I0209 19:33:14.592693 1975 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:33:14.592865 kubelet[1975]: I0209 19:33:14.592853 1975 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:33:14.593010 kubelet[1975]: I0209 19:33:14.592998 1975 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:33:14.600626 kubelet[1975]: I0209 19:33:14.600042 1975 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:33:14.605958 kubelet[1975]: I0209 19:33:14.605899 1975 server.go:1186] "Started kubelet" Feb 9 19:33:14.610000 audit[1975]: AVC avc: denied { mac_admin } for pid=1975 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.610000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:14.610000 audit[1975]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f0fe60 a1=c000f2d908 a2=c000f0fe30 a3=25 items=0 ppid=1 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:14.610000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:14.610000 audit[1975]: AVC avc: denied { mac_admin } for pid=1975 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.610000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:14.610000 audit[1975]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f2f700 a1=c000f2d920 a2=c000f0fef0 a3=25 items=0 ppid=1 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:14.610000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:14.612045 kubelet[1975]: I0209 19:33:14.611319 1975 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:33:14.612045 kubelet[1975]: I0209 19:33:14.611379 1975 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:33:14.612045 kubelet[1975]: I0209 19:33:14.611403 1975 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:33:14.613864 kubelet[1975]: I0209 19:33:14.613750 1975 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:33:14.620968 kubelet[1975]: I0209 19:33:14.620905 1975 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:33:14.625111 kubelet[1975]: I0209 19:33:14.623002 1975 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:33:14.625111 kubelet[1975]: I0209 19:33:14.623958 1975 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:33:14.662925 kubelet[1975]: E0209 19:33:14.662434 1975 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:33:14.662925 kubelet[1975]: E0209 19:33:14.662487 1975 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:33:14.672609 kubelet[1975]: I0209 19:33:14.672581 1975 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:33:14.745097 kubelet[1975]: I0209 19:33:14.745066 1975 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.746852 kubelet[1975]: I0209 19:33:14.746828 1975 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:33:14.747083 kubelet[1975]: I0209 19:33:14.747071 1975 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:33:14.747244 kubelet[1975]: I0209 19:33:14.747232 1975 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:33:14.748282 kubelet[1975]: I0209 19:33:14.748269 1975 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:33:14.748453 kubelet[1975]: I0209 19:33:14.748443 1975 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:33:14.748557 kubelet[1975]: I0209 19:33:14.748546 1975 policy_none.go:49] "None policy: Start" Feb 9 19:33:14.749848 kubelet[1975]: I0209 19:33:14.749813 1975 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:33:14.750034 kubelet[1975]: I0209 19:33:14.750022 1975 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:33:14.750819 kubelet[1975]: I0209 19:33:14.750796 1975 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:33:14.750877 kubelet[1975]: I0209 19:33:14.750822 1975 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:33:14.750877 kubelet[1975]: I0209 19:33:14.750854 1975 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:33:14.750955 kubelet[1975]: E0209 19:33:14.750909 1975 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:33:14.751027 kubelet[1975]: I0209 19:33:14.751015 1975 state_mem.go:75] "Updated machine memory state" Feb 9 19:33:14.761303 kubelet[1975]: I0209 19:33:14.761287 1975 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:33:14.760000 audit[1975]: AVC avc: denied { mac_admin } for pid=1975 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:14.760000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:14.760000 audit[1975]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001541f80 a1=c00157f350 a2=c001541f50 a3=25 items=0 ppid=1 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:14.760000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:14.761898 kubelet[1975]: I0209 19:33:14.761876 1975 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:33:14.762382 kubelet[1975]: I0209 19:33:14.762370 1975 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:33:14.785396 kubelet[1975]: I0209 19:33:14.777966 1975 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.786245 kubelet[1975]: I0209 19:33:14.786233 1975 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.851693 kubelet[1975]: I0209 19:33:14.851558 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:14.851693 kubelet[1975]: I0209 19:33:14.851670 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:14.851857 kubelet[1975]: I0209 19:33:14.851745 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:14.877431 kubelet[1975]: E0209 19:33:14.877398 1975 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.878585 kubelet[1975]: E0209 19:33:14.878559 1975 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925552 kubelet[1975]: I0209 19:33:14.925520 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c1aacc04a1294f6171ab3c9c546750b1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"c1aacc04a1294f6171ab3c9c546750b1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925769 kubelet[1975]: I0209 19:33:14.925616 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925769 kubelet[1975]: I0209 19:33:14.925679 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/119492cfcd2cc10f61551e5511fe4aee-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"119492cfcd2cc10f61551e5511fe4aee\") " pod="kube-system/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925769 kubelet[1975]: I0209 19:33:14.925742 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925864 kubelet[1975]: I0209 19:33:14.925772 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c1aacc04a1294f6171ab3c9c546750b1-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"c1aacc04a1294f6171ab3c9c546750b1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925864 kubelet[1975]: I0209 19:33:14.925833 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c1aacc04a1294f6171ab3c9c546750b1-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"c1aacc04a1294f6171ab3c9c546750b1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925864 kubelet[1975]: I0209 19:33:14.925862 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.925983 kubelet[1975]: I0209 19:33:14.925962 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:14.926021 kubelet[1975]: I0209 19:33:14.926000 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8bd4f6738192d66a03a62c5682830309-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" (UID: \"8bd4f6738192d66a03a62c5682830309\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:15.595033 kubelet[1975]: I0209 19:33:15.594974 1975 apiserver.go:52] "Watching apiserver" Feb 9 19:33:15.624237 kubelet[1975]: I0209 19:33:15.624177 1975 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:33:15.632209 kubelet[1975]: I0209 19:33:15.632122 1975 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:33:15.830226 kubelet[1975]: E0209 19:33:15.830173 1975 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:16.045450 kubelet[1975]: E0209 19:33:16.045355 1975 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:16.418741 kubelet[1975]: E0209 19:33:16.418610 1975 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:33:17.558795 kubelet[1975]: I0209 19:33:17.558727 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-2-bf9c3542bb.novalocal" podStartSLOduration=3.551689611 pod.CreationTimestamp="2024-02-09 19:33:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:33:17.051363691 +0000 UTC m=+2.742254783" watchObservedRunningTime="2024-02-09 19:33:17.551689611 +0000 UTC m=+3.242580743" Feb 9 19:33:19.791708 kubelet[1975]: I0209 19:33:19.791650 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-2-bf9c3542bb.novalocal" podStartSLOduration=7.791532232 pod.CreationTimestamp="2024-02-09 19:33:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:33:17.559113481 +0000 UTC m=+3.250004613" watchObservedRunningTime="2024-02-09 19:33:19.791532232 +0000 UTC m=+5.482423375" Feb 9 19:33:21.697645 sudo[1198]: pam_unix(sudo:session): session closed for user root Feb 9 19:33:21.697000 audit[1198]: USER_END pid=1198 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:21.701154 kernel: kauditd_printk_skb: 393 callbacks suppressed Feb 9 19:33:21.701304 kernel: audit: type=1106 audit(1707507201.697:905): pid=1198 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:21.698000 audit[1198]: CRED_DISP pid=1198 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:21.720728 kernel: audit: type=1104 audit(1707507201.698:906): pid=1198 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:22.011657 sshd[1194]: pam_unix(sshd:session): session closed for user core Feb 9 19:33:22.035000 audit[1194]: USER_END pid=1194 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:22.050001 kernel: audit: type=1106 audit(1707507202.035:907): pid=1194 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:22.035000 audit[1194]: CRED_DISP pid=1194 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:22.062203 kernel: audit: type=1104 audit(1707507202.035:908): pid=1194 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:22.071310 systemd[1]: sshd@6-172.24.4.68:22-172.24.4.1:40728.service: Deactivated successfully. Feb 9 19:33:22.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.68:22-172.24.4.1:40728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:22.073007 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:33:22.073300 systemd[1]: session-7.scope: Consumed 6.286s CPU time. Feb 9 19:33:22.082990 kernel: audit: type=1131 audit(1707507202.070:909): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.68:22-172.24.4.1:40728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:22.083645 systemd-logind[1047]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:33:22.085792 systemd-logind[1047]: Removed session 7. Feb 9 19:33:25.516000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:25.527957 kernel: audit: type=1400 audit(1707507205.516:910): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:25.520000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:25.534005 kernel: audit: type=1400 audit(1707507205.520:911): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:25.520000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001346a60 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:25.541015 kernel: audit: type=1300 audit(1707507205.520:911): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001346a60 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:25.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:25.525000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:25.571615 kernel: audit: type=1327 audit(1707507205.520:911): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:25.571761 kernel: audit: type=1400 audit(1707507205.525:912): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:25.525000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001346f40 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:25.525000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:25.525000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:33:25.525000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001346f80 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:25.525000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:25.516000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001255d60 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:33:25.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:33:25.814219 kubelet[1975]: I0209 19:33:25.814105 1975 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:33:25.815632 env[1054]: time="2024-02-09T19:33:25.814600972Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:33:25.815898 kubelet[1975]: I0209 19:33:25.814887 1975 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:33:26.531295 kubelet[1975]: I0209 19:33:26.531249 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:26.537328 systemd[1]: Created slice kubepods-besteffort-pod18ec5d95_387d_41c5_9fb2_b92d392fa9f9.slice. Feb 9 19:33:26.588445 kubelet[1975]: I0209 19:33:26.588413 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:26.593773 systemd[1]: Created slice kubepods-besteffort-pod9909add8_ea7e_466d_92e3_923b01816c70.slice. Feb 9 19:33:26.612064 kubelet[1975]: I0209 19:33:26.612031 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/18ec5d95-387d-41c5-9fb2-b92d392fa9f9-xtables-lock\") pod \"kube-proxy-7pwhr\" (UID: \"18ec5d95-387d-41c5-9fb2-b92d392fa9f9\") " pod="kube-system/kube-proxy-7pwhr" Feb 9 19:33:26.612331 kubelet[1975]: I0209 19:33:26.612318 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/18ec5d95-387d-41c5-9fb2-b92d392fa9f9-lib-modules\") pod \"kube-proxy-7pwhr\" (UID: \"18ec5d95-387d-41c5-9fb2-b92d392fa9f9\") " pod="kube-system/kube-proxy-7pwhr" Feb 9 19:33:26.612460 kubelet[1975]: I0209 19:33:26.612448 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t4llx\" (UniqueName: \"kubernetes.io/projected/18ec5d95-387d-41c5-9fb2-b92d392fa9f9-kube-api-access-t4llx\") pod \"kube-proxy-7pwhr\" (UID: \"18ec5d95-387d-41c5-9fb2-b92d392fa9f9\") " pod="kube-system/kube-proxy-7pwhr" Feb 9 19:33:26.612661 kubelet[1975]: I0209 19:33:26.612582 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/18ec5d95-387d-41c5-9fb2-b92d392fa9f9-kube-proxy\") pod \"kube-proxy-7pwhr\" (UID: \"18ec5d95-387d-41c5-9fb2-b92d392fa9f9\") " pod="kube-system/kube-proxy-7pwhr" Feb 9 19:33:26.714321 kubelet[1975]: I0209 19:33:26.714272 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9909add8-ea7e-466d-92e3-923b01816c70-var-lib-calico\") pod \"tigera-operator-cfc98749c-m9sqj\" (UID: \"9909add8-ea7e-466d-92e3-923b01816c70\") " pod="tigera-operator/tigera-operator-cfc98749c-m9sqj" Feb 9 19:33:26.715287 kubelet[1975]: I0209 19:33:26.715202 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l7jb9\" (UniqueName: \"kubernetes.io/projected/9909add8-ea7e-466d-92e3-923b01816c70-kube-api-access-l7jb9\") pod \"tigera-operator-cfc98749c-m9sqj\" (UID: \"9909add8-ea7e-466d-92e3-923b01816c70\") " pod="tigera-operator/tigera-operator-cfc98749c-m9sqj" Feb 9 19:33:26.851050 env[1054]: time="2024-02-09T19:33:26.850831317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7pwhr,Uid:18ec5d95-387d-41c5-9fb2-b92d392fa9f9,Namespace:kube-system,Attempt:0,}" Feb 9 19:33:26.900462 env[1054]: time="2024-02-09T19:33:26.900255072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-m9sqj,Uid:9909add8-ea7e-466d-92e3-923b01816c70,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:33:26.912102 env[1054]: time="2024-02-09T19:33:26.911333094Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:26.912889 env[1054]: time="2024-02-09T19:33:26.912741767Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:26.913286 env[1054]: time="2024-02-09T19:33:26.912820324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:26.914385 env[1054]: time="2024-02-09T19:33:26.914047957Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e6adf9bfeb519c94d5e8aea979508c1eab73f92a233fa2537b7bd2266271a25 pid=2084 runtime=io.containerd.runc.v2 Feb 9 19:33:26.939292 env[1054]: time="2024-02-09T19:33:26.939187667Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:26.939686 env[1054]: time="2024-02-09T19:33:26.939656797Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:26.939819 env[1054]: time="2024-02-09T19:33:26.939794024Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:26.940525 env[1054]: time="2024-02-09T19:33:26.940196911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d22dd3c177ade508c2a819f94db389ed8784efc7cb69c0b48c2b8527f1ecd86 pid=2105 runtime=io.containerd.runc.v2 Feb 9 19:33:26.948694 systemd[1]: Started cri-containerd-9e6adf9bfeb519c94d5e8aea979508c1eab73f92a233fa2537b7bd2266271a25.scope. Feb 9 19:33:26.967339 systemd[1]: Started cri-containerd-9d22dd3c177ade508c2a819f94db389ed8784efc7cb69c0b48c2b8527f1ecd86.scope. Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.976252 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:33:26.976367 kernel: audit: type=1400 audit(1707507206.972:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.981059 kernel: audit: type=1400 audit(1707507206.972:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.993778 kernel: audit: type=1400 audit(1707507206.972:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.993894 kernel: audit: type=1400 audit(1707507206.972:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.014133 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:33:27.014347 kernel: audit: type=1400 audit(1707507206.972:918): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.014379 kernel: audit: audit_lost=73 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:33:27.014402 kernel: audit: type=1400 audit(1707507206.972:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.014425 kernel: audit: type=1400 audit(1707507206.972:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.014491 kernel: audit: backlog limit exceeded Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.973000 audit: BPF prog-id=112 op=LOAD Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:26.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366164663962666562353139633934643565386165613937393530 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:26.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366164663962666562353139633934643565386165613937393530 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.988000 audit: BPF prog-id=113 op=LOAD Feb 9 19:33:26.988000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024370 items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:26.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366164663962666562353139633934643565386165613937393530 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.995000 audit: BPF prog-id=114 op=LOAD Feb 9 19:33:26.995000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000243b8 items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:26.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366164663962666562353139633934643565386165613937393530 Feb 9 19:33:26.996000 audit: BPF prog-id=114 op=UNLOAD Feb 9 19:33:26.997000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.997000 audit: BPF prog-id=115 op=LOAD Feb 9 19:33:26.997000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000247c8 items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:26.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366164663962666562353139633934643565386165613937393530 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:26.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.012000 audit: BPF prog-id=116 op=LOAD Feb 9 19:33:27.014000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.014000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964323264643363313737616465353038633261383139663934646233 Feb 9 19:33:27.014000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.014000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964323264643363313737616465353038633261383139663934646233 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.018000 audit: BPF prog-id=117 op=LOAD Feb 9 19:33:27.018000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024c20 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964323264643363313737616465353038633261383139663934646233 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit: BPF prog-id=118 op=LOAD Feb 9 19:33:27.019000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024c68 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964323264643363313737616465353038633261383139663934646233 Feb 9 19:33:27.019000 audit: BPF prog-id=118 op=UNLOAD Feb 9 19:33:27.019000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.019000 audit: BPF prog-id=119 op=LOAD Feb 9 19:33:27.019000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025078 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964323264643363313737616465353038633261383139663934646233 Feb 9 19:33:27.035593 env[1054]: time="2024-02-09T19:33:27.035548403Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7pwhr,Uid:18ec5d95-387d-41c5-9fb2-b92d392fa9f9,Namespace:kube-system,Attempt:0,} returns sandbox id \"9e6adf9bfeb519c94d5e8aea979508c1eab73f92a233fa2537b7bd2266271a25\"" Feb 9 19:33:27.039934 env[1054]: time="2024-02-09T19:33:27.039862015Z" level=info msg="CreateContainer within sandbox \"9e6adf9bfeb519c94d5e8aea979508c1eab73f92a233fa2537b7bd2266271a25\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:33:27.069837 env[1054]: time="2024-02-09T19:33:27.069785308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-m9sqj,Uid:9909add8-ea7e-466d-92e3-923b01816c70,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9d22dd3c177ade508c2a819f94db389ed8784efc7cb69c0b48c2b8527f1ecd86\"" Feb 9 19:33:27.097683 env[1054]: time="2024-02-09T19:33:27.097649038Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:33:27.508828 env[1054]: time="2024-02-09T19:33:27.508740959Z" level=info msg="CreateContainer within sandbox \"9e6adf9bfeb519c94d5e8aea979508c1eab73f92a233fa2537b7bd2266271a25\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1af4cb702b2f20b6e5ab70833e7af2ce7c4cd14ace1776146aca4dcee6de2c65\"" Feb 9 19:33:27.511350 env[1054]: time="2024-02-09T19:33:27.511274251Z" level=info msg="StartContainer for \"1af4cb702b2f20b6e5ab70833e7af2ce7c4cd14ace1776146aca4dcee6de2c65\"" Feb 9 19:33:27.554514 systemd[1]: Started cri-containerd-1af4cb702b2f20b6e5ab70833e7af2ce7c4cd14ace1776146aca4dcee6de2c65.scope. Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2084 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663463623730326232663230623665356162373038333365376166 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.597000 audit: BPF prog-id=120 op=LOAD Feb 9 19:33:27.597000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00039c9e0 items=0 ppid=2084 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663463623730326232663230623665356162373038333365376166 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.598000 audit: BPF prog-id=121 op=LOAD Feb 9 19:33:27.598000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00039ca28 items=0 ppid=2084 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663463623730326232663230623665356162373038333365376166 Feb 9 19:33:27.599000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:33:27.599000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:27.599000 audit: BPF prog-id=122 op=LOAD Feb 9 19:33:27.599000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00039cab8 items=0 ppid=2084 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:27.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663463623730326232663230623665356162373038333365376166 Feb 9 19:33:27.638131 env[1054]: time="2024-02-09T19:33:27.638073685Z" level=info msg="StartContainer for \"1af4cb702b2f20b6e5ab70833e7af2ce7c4cd14ace1776146aca4dcee6de2c65\" returns successfully" Feb 9 19:33:27.865944 kubelet[1975]: I0209 19:33:27.865721 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7pwhr" podStartSLOduration=1.865645359 pod.CreationTimestamp="2024-02-09 19:33:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:33:27.865372908 +0000 UTC m=+13.556293405" watchObservedRunningTime="2024-02-09 19:33:27.865645359 +0000 UTC m=+13.556536481" Feb 9 19:33:28.789000 audit[2216]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:28.789000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc24a22c80 a2=0 a3=7ffc24a22c6c items=0 ppid=2176 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:28.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:33:28.790000 audit[2217]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:28.790000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc04d81430 a2=0 a3=7ffc04d8141c items=0 ppid=2176 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:28.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:33:28.792000 audit[2218]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:28.792000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9555eb10 a2=0 a3=7ffe9555eafc items=0 ppid=2176 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:28.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:33:28.822000 audit[2219]: NETFILTER_CFG table=mangle:62 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:28.822000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8e7522b0 a2=0 a3=7ffc8e75229c items=0 ppid=2176 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:28.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:33:28.823000 audit[2220]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:28.823000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea149d7d0 a2=0 a3=7ffea149d7bc items=0 ppid=2176 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:28.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:33:28.824000 audit[2221]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:28.824000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed2128640 a2=0 a3=7ffed212862c items=0 ppid=2176 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:28.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:33:29.058000 audit[2222]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.058000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe9f7d8ba0 a2=0 a3=7ffe9f7d8b8c items=0 ppid=2176 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:33:29.170000 audit[2224]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.170000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd80a7e440 a2=0 a3=7ffd80a7e42c items=0 ppid=2176 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:33:29.195000 audit[2227]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.195000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff4ea876a0 a2=0 a3=7fff4ea8768c items=0 ppid=2176 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:33:29.199000 audit[2228]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.199000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2a67f620 a2=0 a3=7ffd2a67f60c items=0 ppid=2176 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:33:29.206000 audit[2230]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.206000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4ab76bb0 a2=0 a3=7ffc4ab76b9c items=0 ppid=2176 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:33:29.210000 audit[2231]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.210000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7e146b00 a2=0 a3=7ffe7e146aec items=0 ppid=2176 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:33:29.218000 audit[2233]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.218000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc85bcf410 a2=0 a3=7ffc85bcf3fc items=0 ppid=2176 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:33:29.229000 audit[2236]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.229000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff34d756a0 a2=0 a3=7fff34d7568c items=0 ppid=2176 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:33:29.234000 audit[2237]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.234000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2e9bebc0 a2=0 a3=7ffe2e9bebac items=0 ppid=2176 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:33:29.244000 audit[2239]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.244000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0fd41910 a2=0 a3=7ffd0fd418fc items=0 ppid=2176 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:33:29.248000 audit[2240]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.248000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffde4b8130 a2=0 a3=7fffde4b811c items=0 ppid=2176 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:33:29.261000 audit[2242]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.261000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd60b722b0 a2=0 a3=7ffd60b7229c items=0 ppid=2176 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:33:29.270000 audit[2245]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.270000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff49da40e0 a2=0 a3=7fff49da40cc items=0 ppid=2176 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:33:29.277000 audit[2248]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.277000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd437e1a00 a2=0 a3=7ffd437e19ec items=0 ppid=2176 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:33:29.280000 audit[2249]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.280000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc577d3320 a2=0 a3=7ffc577d330c items=0 ppid=2176 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:33:29.286000 audit[2251]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.286000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffef3a5e0d0 a2=0 a3=7ffef3a5e0bc items=0 ppid=2176 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:29.296000 audit[2254]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:29.296000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc742c4cc0 a2=0 a3=7ffc742c4cac items=0 ppid=2176 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:29.325000 audit[2258]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:29.325000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc4b894900 a2=0 a3=7ffc4b8948ec items=0 ppid=2176 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:29.338000 audit[2258]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:29.338000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc4b894900 a2=0 a3=7ffc4b8948ec items=0 ppid=2176 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:29.341000 audit[2263]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.341000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3dc79280 a2=0 a3=7ffd3dc7926c items=0 ppid=2176 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:33:29.345000 audit[2265]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.345000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff06200fb0 a2=0 a3=7fff06200f9c items=0 ppid=2176 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:33:29.350000 audit[2268]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.350000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe732c9a80 a2=0 a3=7ffe732c9a6c items=0 ppid=2176 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:33:29.351000 audit[2269]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.351000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe96372130 a2=0 a3=7ffe9637211c items=0 ppid=2176 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:33:29.354000 audit[2271]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.354000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffc22e0a0 a2=0 a3=7ffffc22e08c items=0 ppid=2176 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:33:29.356000 audit[2272]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.356000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0a4ac5f0 a2=0 a3=7ffe0a4ac5dc items=0 ppid=2176 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:33:29.359000 audit[2274]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.359000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5adba6a0 a2=0 a3=7fff5adba68c items=0 ppid=2176 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:33:29.363000 audit[2277]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.363000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc1752e8f0 a2=0 a3=7ffc1752e8dc items=0 ppid=2176 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:33:29.365000 audit[2278]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.365000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdff56b3f0 a2=0 a3=7ffdff56b3dc items=0 ppid=2176 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:33:29.370000 audit[2280]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.370000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3ad72af0 a2=0 a3=7ffc3ad72adc items=0 ppid=2176 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:33:29.371000 audit[2281]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.371000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4f407610 a2=0 a3=7fff4f4075fc items=0 ppid=2176 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:33:29.374000 audit[2283]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.374000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3a70db20 a2=0 a3=7ffd3a70db0c items=0 ppid=2176 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:33:29.381000 audit[2286]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.381000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd5affec0 a2=0 a3=7ffcd5affeac items=0 ppid=2176 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:33:29.386000 audit[2289]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.386000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa8507b60 a2=0 a3=7fffa8507b4c items=0 ppid=2176 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:33:29.387000 audit[2290]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.387000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe0103a900 a2=0 a3=7ffe0103a8ec items=0 ppid=2176 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:33:29.390000 audit[2292]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.390000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcb50154a0 a2=0 a3=7ffcb501548c items=0 ppid=2176 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:29.394000 audit[2295]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:29.394000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffe57d22d0 a2=0 a3=7fffe57d22bc items=0 ppid=2176 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:29.402000 audit[2299]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:33:29.402000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd9cae0750 a2=0 a3=7ffd9cae073c items=0 ppid=2176 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.402000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:29.403000 audit[2299]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:33:29.403000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd9cae0750 a2=0 a3=7ffd9cae073c items=0 ppid=2176 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:29.403000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:29.595209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount226126495.mount: Deactivated successfully. Feb 9 19:33:31.446952 env[1054]: time="2024-02-09T19:33:31.446841642Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:31.460045 env[1054]: time="2024-02-09T19:33:31.460007610Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:31.467451 env[1054]: time="2024-02-09T19:33:31.467420184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:31.470710 env[1054]: time="2024-02-09T19:33:31.470685719Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:31.472533 env[1054]: time="2024-02-09T19:33:31.472474023Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:33:31.477519 env[1054]: time="2024-02-09T19:33:31.477482679Z" level=info msg="CreateContainer within sandbox \"9d22dd3c177ade508c2a819f94db389ed8784efc7cb69c0b48c2b8527f1ecd86\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:33:31.491370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1064805452.mount: Deactivated successfully. Feb 9 19:33:31.497144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3582638802.mount: Deactivated successfully. Feb 9 19:33:31.507017 env[1054]: time="2024-02-09T19:33:31.506975422Z" level=info msg="CreateContainer within sandbox \"9d22dd3c177ade508c2a819f94db389ed8784efc7cb69c0b48c2b8527f1ecd86\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7a79686632eb6a246f7baded3f65f8b16e37c36c89301796e1a9dcd991216287\"" Feb 9 19:33:31.508629 env[1054]: time="2024-02-09T19:33:31.508565224Z" level=info msg="StartContainer for \"7a79686632eb6a246f7baded3f65f8b16e37c36c89301796e1a9dcd991216287\"" Feb 9 19:33:31.534703 systemd[1]: Started cri-containerd-7a79686632eb6a246f7baded3f65f8b16e37c36c89301796e1a9dcd991216287.scope. Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.559000 audit: BPF prog-id=123 op=LOAD Feb 9 19:33:31.560000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.560000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2105 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373936383636333265623661323436663762616465643366363566 Feb 9 19:33:31.560000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.560000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=2105 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373936383636333265623661323436663762616465643366363566 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit: BPF prog-id=124 op=LOAD Feb 9 19:33:31.561000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000248140 items=0 ppid=2105 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373936383636333265623661323436663762616465643366363566 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit: BPF prog-id=125 op=LOAD Feb 9 19:33:31.561000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000248188 items=0 ppid=2105 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373936383636333265623661323436663762616465643366363566 Feb 9 19:33:31.561000 audit: BPF prog-id=125 op=UNLOAD Feb 9 19:33:31.561000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.561000 audit: BPF prog-id=126 op=LOAD Feb 9 19:33:31.561000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000248598 items=0 ppid=2105 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373936383636333265623661323436663762616465643366363566 Feb 9 19:33:31.761453 env[1054]: time="2024-02-09T19:33:31.761385337Z" level=info msg="StartContainer for \"7a79686632eb6a246f7baded3f65f8b16e37c36c89301796e1a9dcd991216287\" returns successfully" Feb 9 19:33:31.875463 kubelet[1975]: I0209 19:33:31.875389 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-m9sqj" podStartSLOduration=-9.223372030979502e+09 pod.CreationTimestamp="2024-02-09 19:33:26 +0000 UTC" firstStartedPulling="2024-02-09 19:33:27.070895271 +0000 UTC m=+12.761786363" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:33:31.874727306 +0000 UTC m=+17.565618448" watchObservedRunningTime="2024-02-09 19:33:31.875273941 +0000 UTC m=+17.566165073" Feb 9 19:33:33.959000 audit[2365]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:33.962175 kernel: kauditd_printk_skb: 338 callbacks suppressed Feb 9 19:33:33.962258 kernel: audit: type=1325 audit(1707507213.959:1017): table=filter:103 family=2 entries=13 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:33.959000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd514212d0 a2=0 a3=7ffd514212bc items=0 ppid=2176 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:33.970466 kernel: audit: type=1300 audit(1707507213.959:1017): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd514212d0 a2=0 a3=7ffd514212bc items=0 ppid=2176 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:33.970549 kernel: audit: type=1327 audit(1707507213.959:1017): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:33.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:33.974000 audit[2365]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:33.974000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd514212d0 a2=0 a3=7ffd514212bc items=0 ppid=2176 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:33.984443 kernel: audit: type=1325 audit(1707507213.974:1018): table=nat:104 family=2 entries=20 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:33.984598 kernel: audit: type=1300 audit(1707507213.974:1018): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd514212d0 a2=0 a3=7ffd514212bc items=0 ppid=2176 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:33.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:33.990952 kernel: audit: type=1327 audit(1707507213.974:1018): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:34.039314 kubelet[1975]: I0209 19:33:34.039286 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:34.044629 systemd[1]: Created slice kubepods-besteffort-pode2e02ab8_d4cd_4739_a3a6_0cdd76fa350c.slice. Feb 9 19:33:34.145328 kubelet[1975]: I0209 19:33:34.145291 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:34.150702 systemd[1]: Created slice kubepods-besteffort-pode873c63b_3391_4ddb_8e2f_30fb51618191.slice. Feb 9 19:33:34.165074 kubelet[1975]: I0209 19:33:34.165037 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c-tigera-ca-bundle\") pod \"calico-typha-5949dcf565-jgrx9\" (UID: \"e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c\") " pod="calico-system/calico-typha-5949dcf565-jgrx9" Feb 9 19:33:34.165250 kubelet[1975]: I0209 19:33:34.165088 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c-typha-certs\") pod \"calico-typha-5949dcf565-jgrx9\" (UID: \"e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c\") " pod="calico-system/calico-typha-5949dcf565-jgrx9" Feb 9 19:33:34.165250 kubelet[1975]: I0209 19:33:34.165121 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rqzns\" (UniqueName: \"kubernetes.io/projected/e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c-kube-api-access-rqzns\") pod \"calico-typha-5949dcf565-jgrx9\" (UID: \"e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c\") " pod="calico-system/calico-typha-5949dcf565-jgrx9" Feb 9 19:33:34.169000 audit[2391]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:34.169000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffff97d0620 a2=0 a3=7ffff97d060c items=0 ppid=2176 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.180346 kernel: audit: type=1325 audit(1707507214.169:1019): table=filter:105 family=2 entries=14 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:34.180405 kernel: audit: type=1300 audit(1707507214.169:1019): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffff97d0620 a2=0 a3=7ffff97d060c items=0 ppid=2176 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:34.170000 audit[2391]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:34.188881 kernel: audit: type=1327 audit(1707507214.169:1019): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:34.188994 kernel: audit: type=1325 audit(1707507214.170:1020): table=nat:106 family=2 entries=20 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:34.170000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffff97d0620 a2=0 a3=7ffff97d060c items=0 ppid=2176 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:34.265391 kubelet[1975]: I0209 19:33:34.265359 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-policysync\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.265707 kubelet[1975]: I0209 19:33:34.265666 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-var-lib-calico\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.265880 kubelet[1975]: I0209 19:33:34.265854 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-cni-bin-dir\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266031 kubelet[1975]: I0209 19:33:34.266018 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-flexvol-driver-host\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266224 kubelet[1975]: I0209 19:33:34.266195 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t742m\" (UniqueName: \"kubernetes.io/projected/e873c63b-3391-4ddb-8e2f-30fb51618191-kube-api-access-t742m\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266300 kubelet[1975]: I0209 19:33:34.266268 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e873c63b-3391-4ddb-8e2f-30fb51618191-tigera-ca-bundle\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266345 kubelet[1975]: I0209 19:33:34.266316 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e873c63b-3391-4ddb-8e2f-30fb51618191-node-certs\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266482 kubelet[1975]: I0209 19:33:34.266402 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-xtables-lock\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266534 kubelet[1975]: I0209 19:33:34.266515 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-var-run-calico\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266574 kubelet[1975]: I0209 19:33:34.266563 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-cni-net-dir\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266720 kubelet[1975]: I0209 19:33:34.266683 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-cni-log-dir\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.266776 kubelet[1975]: I0209 19:33:34.266767 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e873c63b-3391-4ddb-8e2f-30fb51618191-lib-modules\") pod \"calico-node-zq5xd\" (UID: \"e873c63b-3391-4ddb-8e2f-30fb51618191\") " pod="calico-system/calico-node-zq5xd" Feb 9 19:33:34.281202 kubelet[1975]: I0209 19:33:34.281154 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:34.281680 kubelet[1975]: E0209 19:33:34.281642 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:34.348395 env[1054]: time="2024-02-09T19:33:34.348328977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5949dcf565-jgrx9,Uid:e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c,Namespace:calico-system,Attempt:0,}" Feb 9 19:33:34.369953 kubelet[1975]: I0209 19:33:34.369927 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xjt2l\" (UniqueName: \"kubernetes.io/projected/9f8d9fa7-839c-4971-b751-a94db83544a4-kube-api-access-xjt2l\") pod \"csi-node-driver-2fh9p\" (UID: \"9f8d9fa7-839c-4971-b751-a94db83544a4\") " pod="calico-system/csi-node-driver-2fh9p" Feb 9 19:33:34.370078 kubelet[1975]: I0209 19:33:34.369980 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9f8d9fa7-839c-4971-b751-a94db83544a4-socket-dir\") pod \"csi-node-driver-2fh9p\" (UID: \"9f8d9fa7-839c-4971-b751-a94db83544a4\") " pod="calico-system/csi-node-driver-2fh9p" Feb 9 19:33:34.370078 kubelet[1975]: I0209 19:33:34.370020 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9f8d9fa7-839c-4971-b751-a94db83544a4-kubelet-dir\") pod \"csi-node-driver-2fh9p\" (UID: \"9f8d9fa7-839c-4971-b751-a94db83544a4\") " pod="calico-system/csi-node-driver-2fh9p" Feb 9 19:33:34.370078 kubelet[1975]: I0209 19:33:34.370047 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9f8d9fa7-839c-4971-b751-a94db83544a4-varrun\") pod \"csi-node-driver-2fh9p\" (UID: \"9f8d9fa7-839c-4971-b751-a94db83544a4\") " pod="calico-system/csi-node-driver-2fh9p" Feb 9 19:33:34.370194 kubelet[1975]: I0209 19:33:34.370095 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9f8d9fa7-839c-4971-b751-a94db83544a4-registration-dir\") pod \"csi-node-driver-2fh9p\" (UID: \"9f8d9fa7-839c-4971-b751-a94db83544a4\") " pod="calico-system/csi-node-driver-2fh9p" Feb 9 19:33:34.374947 env[1054]: time="2024-02-09T19:33:34.374867016Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:34.383170 env[1054]: time="2024-02-09T19:33:34.381986831Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:34.383170 env[1054]: time="2024-02-09T19:33:34.382016657Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:34.383170 env[1054]: time="2024-02-09T19:33:34.382193459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/804b50b75f5e4da645e8d19d1bdace7f010ba28eadc561bad7af3050929035bb pid=2400 runtime=io.containerd.runc.v2 Feb 9 19:33:34.393924 kubelet[1975]: E0209 19:33:34.393311 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.393924 kubelet[1975]: W0209 19:33:34.393332 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.393924 kubelet[1975]: E0209 19:33:34.393373 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.406778 systemd[1]: Started cri-containerd-804b50b75f5e4da645e8d19d1bdace7f010ba28eadc561bad7af3050929035bb.scope. Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.422000 audit: BPF prog-id=127 op=LOAD Feb 9 19:33:34.423000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.423000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2400 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830346235306237356635653464613634356538643139643162646163 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2400 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830346235306237356635653464613634356538643139643162646163 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.424000 audit: BPF prog-id=128 op=LOAD Feb 9 19:33:34.424000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000248f0 items=0 ppid=2400 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830346235306237356635653464613634356538643139643162646163 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.425000 audit: BPF prog-id=129 op=LOAD Feb 9 19:33:34.425000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024938 items=0 ppid=2400 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830346235306237356635653464613634356538643139643162646163 Feb 9 19:33:34.428000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:33:34.428000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.428000 audit: BPF prog-id=130 op=LOAD Feb 9 19:33:34.428000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024d48 items=0 ppid=2400 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830346235306237356635653464613634356538643139643162646163 Feb 9 19:33:34.471263 kubelet[1975]: E0209 19:33:34.471225 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.471263 kubelet[1975]: W0209 19:33:34.471245 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.471263 kubelet[1975]: E0209 19:33:34.471277 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.472260 kubelet[1975]: E0209 19:33:34.471485 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.472260 kubelet[1975]: W0209 19:33:34.471494 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.472260 kubelet[1975]: E0209 19:33:34.471506 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.472260 kubelet[1975]: E0209 19:33:34.471672 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.472260 kubelet[1975]: W0209 19:33:34.471681 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.472260 kubelet[1975]: E0209 19:33:34.471692 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.472260 kubelet[1975]: E0209 19:33:34.471865 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.472260 kubelet[1975]: W0209 19:33:34.471874 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.472260 kubelet[1975]: E0209 19:33:34.471887 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.472260 kubelet[1975]: E0209 19:33:34.472104 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.472964 kubelet[1975]: W0209 19:33:34.472114 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.472964 kubelet[1975]: E0209 19:33:34.472129 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.472964 kubelet[1975]: E0209 19:33:34.472307 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.472964 kubelet[1975]: W0209 19:33:34.472316 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.472964 kubelet[1975]: E0209 19:33:34.472329 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.474292 kubelet[1975]: E0209 19:33:34.473264 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.474292 kubelet[1975]: W0209 19:33:34.473288 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.474292 kubelet[1975]: E0209 19:33:34.473307 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.474292 kubelet[1975]: E0209 19:33:34.473473 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.474292 kubelet[1975]: W0209 19:33:34.473481 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.474292 kubelet[1975]: E0209 19:33:34.473492 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.474292 kubelet[1975]: E0209 19:33:34.473616 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.474292 kubelet[1975]: W0209 19:33:34.473636 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.474292 kubelet[1975]: E0209 19:33:34.473647 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.474292 kubelet[1975]: E0209 19:33:34.473810 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.474616 kubelet[1975]: W0209 19:33:34.473830 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.474616 kubelet[1975]: E0209 19:33:34.473841 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.474616 kubelet[1975]: E0209 19:33:34.474003 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.474616 kubelet[1975]: W0209 19:33:34.474011 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.474616 kubelet[1975]: E0209 19:33:34.474022 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.474616 kubelet[1975]: E0209 19:33:34.474194 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.474616 kubelet[1975]: W0209 19:33:34.474203 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.474616 kubelet[1975]: E0209 19:33:34.474214 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.474616 kubelet[1975]: E0209 19:33:34.474374 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.474616 kubelet[1975]: W0209 19:33:34.474383 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.475062 kubelet[1975]: E0209 19:33:34.474395 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.475062 kubelet[1975]: E0209 19:33:34.474581 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.475062 kubelet[1975]: W0209 19:33:34.474590 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.475062 kubelet[1975]: E0209 19:33:34.474602 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.475062 kubelet[1975]: E0209 19:33:34.474743 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.475062 kubelet[1975]: W0209 19:33:34.474753 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.475062 kubelet[1975]: E0209 19:33:34.474766 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.475062 kubelet[1975]: E0209 19:33:34.474966 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.475062 kubelet[1975]: W0209 19:33:34.474975 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.476735 kubelet[1975]: E0209 19:33:34.475069 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.476735 kubelet[1975]: E0209 19:33:34.475200 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.476735 kubelet[1975]: W0209 19:33:34.475212 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.476735 kubelet[1975]: E0209 19:33:34.475414 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.476735 kubelet[1975]: W0209 19:33:34.475423 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.476735 kubelet[1975]: E0209 19:33:34.475531 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.476735 kubelet[1975]: E0209 19:33:34.475556 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.476735 kubelet[1975]: E0209 19:33:34.475706 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.476735 kubelet[1975]: W0209 19:33:34.475715 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.476735 kubelet[1975]: E0209 19:33:34.475727 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.477463 kubelet[1975]: E0209 19:33:34.476159 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.477463 kubelet[1975]: W0209 19:33:34.476175 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.477463 kubelet[1975]: E0209 19:33:34.476230 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.477463 kubelet[1975]: E0209 19:33:34.476531 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.477463 kubelet[1975]: W0209 19:33:34.476542 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.477463 kubelet[1975]: E0209 19:33:34.476566 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.477463 kubelet[1975]: E0209 19:33:34.476970 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.477463 kubelet[1975]: W0209 19:33:34.476980 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.477463 kubelet[1975]: E0209 19:33:34.476994 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.477463 kubelet[1975]: E0209 19:33:34.477169 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.477717 kubelet[1975]: W0209 19:33:34.477177 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.477717 kubelet[1975]: E0209 19:33:34.477190 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.478967 kubelet[1975]: E0209 19:33:34.478337 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.478967 kubelet[1975]: W0209 19:33:34.478349 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.478967 kubelet[1975]: E0209 19:33:34.478470 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.478967 kubelet[1975]: E0209 19:33:34.478523 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.478967 kubelet[1975]: W0209 19:33:34.478532 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.478967 kubelet[1975]: E0209 19:33:34.478590 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.478967 kubelet[1975]: E0209 19:33:34.478817 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.478967 kubelet[1975]: W0209 19:33:34.478827 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.478967 kubelet[1975]: E0209 19:33:34.478840 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.499292 env[1054]: time="2024-02-09T19:33:34.499252653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5949dcf565-jgrx9,Uid:e2e02ab8-d4cd-4739-a3a6-0cdd76fa350c,Namespace:calico-system,Attempt:0,} returns sandbox id \"804b50b75f5e4da645e8d19d1bdace7f010ba28eadc561bad7af3050929035bb\"" Feb 9 19:33:34.502573 env[1054]: time="2024-02-09T19:33:34.502540531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:33:34.573577 kubelet[1975]: E0209 19:33:34.573474 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.573577 kubelet[1975]: W0209 19:33:34.573494 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.573577 kubelet[1975]: E0209 19:33:34.573513 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.573745 kubelet[1975]: E0209 19:33:34.573695 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.573745 kubelet[1975]: W0209 19:33:34.573704 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.573745 kubelet[1975]: E0209 19:33:34.573715 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.652471 kubelet[1975]: E0209 19:33:34.652448 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.652471 kubelet[1975]: W0209 19:33:34.652466 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.652471 kubelet[1975]: E0209 19:33:34.652485 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.674884 kubelet[1975]: E0209 19:33:34.674862 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.675070 kubelet[1975]: W0209 19:33:34.675055 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.675144 kubelet[1975]: E0209 19:33:34.675134 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.753462 env[1054]: time="2024-02-09T19:33:34.753404160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zq5xd,Uid:e873c63b-3391-4ddb-8e2f-30fb51618191,Namespace:calico-system,Attempt:0,}" Feb 9 19:33:34.776861 kubelet[1975]: E0209 19:33:34.776816 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.776861 kubelet[1975]: W0209 19:33:34.776840 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.777208 kubelet[1975]: E0209 19:33:34.776865 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.788142 env[1054]: time="2024-02-09T19:33:34.787994503Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:34.788142 env[1054]: time="2024-02-09T19:33:34.788033697Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:34.788142 env[1054]: time="2024-02-09T19:33:34.788046371Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:34.788969 env[1054]: time="2024-02-09T19:33:34.788581234Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5 pid=2474 runtime=io.containerd.runc.v2 Feb 9 19:33:34.809284 systemd[1]: Started cri-containerd-6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5.scope. Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.830000 audit: BPF prog-id=131 op=LOAD Feb 9 19:33:34.831000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.831000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2474 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383935383764363539373130663932363837333166306362663331 Feb 9 19:33:34.831000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.831000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2474 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383935383764363539373130663932363837333166306362663331 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.832000 audit: BPF prog-id=132 op=LOAD Feb 9 19:33:34.832000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001851e0 items=0 ppid=2474 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383935383764363539373130663932363837333166306362663331 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.833000 audit: BPF prog-id=133 op=LOAD Feb 9 19:33:34.833000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185228 items=0 ppid=2474 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383935383764363539373130663932363837333166306362663331 Feb 9 19:33:34.834000 audit: BPF prog-id=133 op=UNLOAD Feb 9 19:33:34.834000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.834000 audit: BPF prog-id=134 op=LOAD Feb 9 19:33:34.834000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185638 items=0 ppid=2474 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383935383764363539373130663932363837333166306362663331 Feb 9 19:33:34.861959 kubelet[1975]: E0209 19:33:34.861893 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:34.862104 kubelet[1975]: W0209 19:33:34.861967 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:34.862104 kubelet[1975]: E0209 19:33:34.861988 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:34.876464 env[1054]: time="2024-02-09T19:33:34.876255430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zq5xd,Uid:e873c63b-3391-4ddb-8e2f-30fb51618191,Namespace:calico-system,Attempt:0,} returns sandbox id \"6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5\"" Feb 9 19:33:35.300000 audit[2533]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2533 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:35.300000 audit[2533]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd5ce99400 a2=0 a3=7ffd5ce993ec items=0 ppid=2176 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:35.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:35.303000 audit[2533]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2533 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:35.303000 audit[2533]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd5ce99400 a2=0 a3=7ffd5ce993ec items=0 ppid=2176 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:35.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:35.752553 kubelet[1975]: E0209 19:33:35.752473 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:36.200046 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3960995960.mount: Deactivated successfully. Feb 9 19:33:37.752250 kubelet[1975]: E0209 19:33:37.752191 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:38.850704 env[1054]: time="2024-02-09T19:33:38.850652929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:38.853134 env[1054]: time="2024-02-09T19:33:38.853102474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:38.855394 env[1054]: time="2024-02-09T19:33:38.855360028Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:38.857399 env[1054]: time="2024-02-09T19:33:38.857368556Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:38.858547 env[1054]: time="2024-02-09T19:33:38.858512752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:33:38.859606 env[1054]: time="2024-02-09T19:33:38.859515713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:33:38.875708 env[1054]: time="2024-02-09T19:33:38.875672257Z" level=info msg="CreateContainer within sandbox \"804b50b75f5e4da645e8d19d1bdace7f010ba28eadc561bad7af3050929035bb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:33:38.889979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount315777956.mount: Deactivated successfully. Feb 9 19:33:38.908198 env[1054]: time="2024-02-09T19:33:38.908126943Z" level=info msg="CreateContainer within sandbox \"804b50b75f5e4da645e8d19d1bdace7f010ba28eadc561bad7af3050929035bb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"247314e65a0446841ea58aa818e544bb7c92c4bba6e867c252be978bea594fbf\"" Feb 9 19:33:38.909402 env[1054]: time="2024-02-09T19:33:38.909378320Z" level=info msg="StartContainer for \"247314e65a0446841ea58aa818e544bb7c92c4bba6e867c252be978bea594fbf\"" Feb 9 19:33:38.934614 systemd[1]: Started cri-containerd-247314e65a0446841ea58aa818e544bb7c92c4bba6e867c252be978bea594fbf.scope. Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit: BPF prog-id=135 op=LOAD Feb 9 19:33:38.955000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.955000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2400 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373331346536356130343436383431656135386161383138653534 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2400 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373331346536356130343436383431656135386161383138653534 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit: BPF prog-id=136 op=LOAD Feb 9 19:33:38.956000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00023fdc0 items=0 ppid=2400 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373331346536356130343436383431656135386161383138653534 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit: BPF prog-id=137 op=LOAD Feb 9 19:33:38.956000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00023fe08 items=0 ppid=2400 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373331346536356130343436383431656135386161383138653534 Feb 9 19:33:38.956000 audit: BPF prog-id=137 op=UNLOAD Feb 9 19:33:38.956000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:38.956000 audit: BPF prog-id=138 op=LOAD Feb 9 19:33:38.956000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000380218 items=0 ppid=2400 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373331346536356130343436383431656135386161383138653534 Feb 9 19:33:39.000848 env[1054]: time="2024-02-09T19:33:39.000786855Z" level=info msg="StartContainer for \"247314e65a0446841ea58aa818e544bb7c92c4bba6e867c252be978bea594fbf\" returns successfully" Feb 9 19:33:39.752875 kubelet[1975]: E0209 19:33:39.752798 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:39.940987 kubelet[1975]: E0209 19:33:39.940955 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.941231 kubelet[1975]: W0209 19:33:39.941212 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.941365 kubelet[1975]: E0209 19:33:39.941349 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.941813 kubelet[1975]: E0209 19:33:39.941777 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.941947 kubelet[1975]: W0209 19:33:39.941928 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.942059 kubelet[1975]: E0209 19:33:39.942047 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.942508 kubelet[1975]: E0209 19:33:39.942473 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.942645 kubelet[1975]: W0209 19:33:39.942626 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.942804 kubelet[1975]: E0209 19:33:39.942787 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.943335 kubelet[1975]: E0209 19:33:39.943319 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.943476 kubelet[1975]: W0209 19:33:39.943457 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.943620 kubelet[1975]: E0209 19:33:39.943603 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.944148 kubelet[1975]: E0209 19:33:39.944133 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.944290 kubelet[1975]: W0209 19:33:39.944270 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.944436 kubelet[1975]: E0209 19:33:39.944419 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.945155 kubelet[1975]: E0209 19:33:39.945139 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.945284 kubelet[1975]: W0209 19:33:39.945269 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.945404 kubelet[1975]: E0209 19:33:39.945392 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.946296 kubelet[1975]: E0209 19:33:39.946281 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.946418 kubelet[1975]: W0209 19:33:39.946401 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.946530 kubelet[1975]: E0209 19:33:39.946513 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.946824 kubelet[1975]: E0209 19:33:39.946808 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.946966 kubelet[1975]: W0209 19:33:39.946948 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.947069 kubelet[1975]: E0209 19:33:39.947053 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.947324 kubelet[1975]: E0209 19:33:39.947312 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.947431 kubelet[1975]: W0209 19:33:39.947413 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.947529 kubelet[1975]: E0209 19:33:39.947515 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.947789 kubelet[1975]: E0209 19:33:39.947774 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.947894 kubelet[1975]: W0209 19:33:39.947877 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.948049 kubelet[1975]: E0209 19:33:39.948032 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.948325 kubelet[1975]: E0209 19:33:39.948311 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.948425 kubelet[1975]: W0209 19:33:39.948408 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.948527 kubelet[1975]: E0209 19:33:39.948513 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.948909 kubelet[1975]: E0209 19:33:39.948894 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.949051 kubelet[1975]: W0209 19:33:39.949034 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.949168 kubelet[1975]: E0209 19:33:39.949152 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.025757 kubelet[1975]: E0209 19:33:40.025635 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.025757 kubelet[1975]: W0209 19:33:40.025679 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.025757 kubelet[1975]: E0209 19:33:40.025724 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.026282 kubelet[1975]: E0209 19:33:40.026240 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.026282 kubelet[1975]: W0209 19:33:40.026276 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.026417 kubelet[1975]: E0209 19:33:40.026321 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.028063 kubelet[1975]: E0209 19:33:40.028036 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.028222 kubelet[1975]: W0209 19:33:40.028199 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.028353 kubelet[1975]: E0209 19:33:40.028335 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.028795 kubelet[1975]: E0209 19:33:40.028779 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.028903 kubelet[1975]: W0209 19:33:40.028884 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.029047 kubelet[1975]: E0209 19:33:40.029032 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.029895 kubelet[1975]: E0209 19:33:40.029877 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.030046 kubelet[1975]: W0209 19:33:40.030027 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.030215 kubelet[1975]: E0209 19:33:40.030198 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.030582 kubelet[1975]: E0209 19:33:40.030561 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.030699 kubelet[1975]: W0209 19:33:40.030680 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.030831 kubelet[1975]: E0209 19:33:40.030808 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.031187 kubelet[1975]: E0209 19:33:40.031171 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.031341 kubelet[1975]: W0209 19:33:40.031322 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.031479 kubelet[1975]: E0209 19:33:40.031464 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.031821 kubelet[1975]: E0209 19:33:40.031806 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.031971 kubelet[1975]: W0209 19:33:40.031955 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.032087 kubelet[1975]: E0209 19:33:40.032071 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.032387 kubelet[1975]: E0209 19:33:40.032374 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.032526 kubelet[1975]: W0209 19:33:40.032508 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.032686 kubelet[1975]: E0209 19:33:40.032669 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.033016 kubelet[1975]: E0209 19:33:40.032993 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.033133 kubelet[1975]: W0209 19:33:40.033116 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.033292 kubelet[1975]: E0209 19:33:40.033277 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.033696 kubelet[1975]: E0209 19:33:40.033681 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.033816 kubelet[1975]: W0209 19:33:40.033799 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.034002 kubelet[1975]: E0209 19:33:40.033987 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.034360 kubelet[1975]: E0209 19:33:40.034345 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.034458 kubelet[1975]: W0209 19:33:40.034443 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.034564 kubelet[1975]: E0209 19:33:40.034549 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.034985 kubelet[1975]: E0209 19:33:40.034970 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.035087 kubelet[1975]: W0209 19:33:40.035073 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.035192 kubelet[1975]: E0209 19:33:40.035175 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.035637 kubelet[1975]: E0209 19:33:40.035621 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.035735 kubelet[1975]: W0209 19:33:40.035718 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.035831 kubelet[1975]: E0209 19:33:40.035817 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.036303 kubelet[1975]: E0209 19:33:40.036288 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.036482 kubelet[1975]: W0209 19:33:40.036464 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.036581 kubelet[1975]: E0209 19:33:40.036567 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.037290 kubelet[1975]: E0209 19:33:40.037275 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.037407 kubelet[1975]: W0209 19:33:40.037388 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.037603 kubelet[1975]: E0209 19:33:40.037589 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.037774 kubelet[1975]: E0209 19:33:40.037761 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.037883 kubelet[1975]: W0209 19:33:40.037867 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.038184 kubelet[1975]: E0209 19:33:40.038167 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.038493 kubelet[1975]: E0209 19:33:40.038478 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.038597 kubelet[1975]: W0209 19:33:40.038578 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.038713 kubelet[1975]: E0209 19:33:40.038697 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.524884 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3532994790.mount: Deactivated successfully. Feb 9 19:33:40.885910 kubelet[1975]: I0209 19:33:40.885661 1975 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:33:40.955397 kubelet[1975]: E0209 19:33:40.955340 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.955397 kubelet[1975]: W0209 19:33:40.955360 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.955397 kubelet[1975]: E0209 19:33:40.955378 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.955829 kubelet[1975]: E0209 19:33:40.955506 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.955829 kubelet[1975]: W0209 19:33:40.955515 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.955829 kubelet[1975]: E0209 19:33:40.955526 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.955829 kubelet[1975]: E0209 19:33:40.955660 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.955829 kubelet[1975]: W0209 19:33:40.955668 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.955829 kubelet[1975]: E0209 19:33:40.955679 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.956282 kubelet[1975]: E0209 19:33:40.955952 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.956282 kubelet[1975]: W0209 19:33:40.955962 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.956282 kubelet[1975]: E0209 19:33:40.955977 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.956282 kubelet[1975]: E0209 19:33:40.956178 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.956282 kubelet[1975]: W0209 19:33:40.956188 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.956282 kubelet[1975]: E0209 19:33:40.956199 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.956788 kubelet[1975]: E0209 19:33:40.956397 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.956788 kubelet[1975]: W0209 19:33:40.956419 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.956788 kubelet[1975]: E0209 19:33:40.956439 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.957115 kubelet[1975]: E0209 19:33:40.957082 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.957115 kubelet[1975]: W0209 19:33:40.957099 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.957115 kubelet[1975]: E0209 19:33:40.957113 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.957863 kubelet[1975]: E0209 19:33:40.957283 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.957863 kubelet[1975]: W0209 19:33:40.957293 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.957863 kubelet[1975]: E0209 19:33:40.957305 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.957863 kubelet[1975]: E0209 19:33:40.957756 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.957863 kubelet[1975]: W0209 19:33:40.957798 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.957863 kubelet[1975]: E0209 19:33:40.957811 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.958402 kubelet[1975]: E0209 19:33:40.958040 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.958402 kubelet[1975]: W0209 19:33:40.958049 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.958402 kubelet[1975]: E0209 19:33:40.958073 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.958870 kubelet[1975]: E0209 19:33:40.958811 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.958870 kubelet[1975]: W0209 19:33:40.958829 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.958870 kubelet[1975]: E0209 19:33:40.958843 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.959395 kubelet[1975]: E0209 19:33:40.959149 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:40.959395 kubelet[1975]: W0209 19:33:40.959170 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:40.959395 kubelet[1975]: E0209 19:33:40.959183 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.038723 kubelet[1975]: E0209 19:33:41.038445 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.038723 kubelet[1975]: W0209 19:33:41.038477 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.038723 kubelet[1975]: E0209 19:33:41.038511 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.039405 kubelet[1975]: E0209 19:33:41.039228 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.039405 kubelet[1975]: W0209 19:33:41.039252 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.039405 kubelet[1975]: E0209 19:33:41.039294 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.039687 kubelet[1975]: E0209 19:33:41.039477 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.039687 kubelet[1975]: W0209 19:33:41.039488 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.039687 kubelet[1975]: E0209 19:33:41.039507 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.039687 kubelet[1975]: E0209 19:33:41.039656 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.039687 kubelet[1975]: W0209 19:33:41.039665 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.039687 kubelet[1975]: E0209 19:33:41.039678 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.040156 kubelet[1975]: E0209 19:33:41.039817 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.040156 kubelet[1975]: W0209 19:33:41.039826 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.040156 kubelet[1975]: E0209 19:33:41.039838 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.040156 kubelet[1975]: E0209 19:33:41.040067 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.040156 kubelet[1975]: W0209 19:33:41.040076 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.040156 kubelet[1975]: E0209 19:33:41.040093 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.041256 kubelet[1975]: E0209 19:33:41.040969 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.041256 kubelet[1975]: W0209 19:33:41.040995 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.041256 kubelet[1975]: E0209 19:33:41.041032 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.041793 kubelet[1975]: E0209 19:33:41.041605 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.041793 kubelet[1975]: W0209 19:33:41.041628 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.041793 kubelet[1975]: E0209 19:33:41.041691 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.043636 kubelet[1975]: E0209 19:33:41.042238 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.043636 kubelet[1975]: W0209 19:33:41.042258 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.043636 kubelet[1975]: E0209 19:33:41.042348 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.043636 kubelet[1975]: E0209 19:33:41.042512 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.043636 kubelet[1975]: W0209 19:33:41.042530 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.043636 kubelet[1975]: E0209 19:33:41.042627 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.043636 kubelet[1975]: E0209 19:33:41.042836 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.043636 kubelet[1975]: W0209 19:33:41.042855 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.043636 kubelet[1975]: E0209 19:33:41.042897 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.043636 kubelet[1975]: E0209 19:33:41.043237 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.044293 kubelet[1975]: W0209 19:33:41.043256 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.044293 kubelet[1975]: E0209 19:33:41.043295 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.045075 kubelet[1975]: E0209 19:33:41.044500 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.045075 kubelet[1975]: W0209 19:33:41.044525 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.045075 kubelet[1975]: E0209 19:33:41.044566 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.045075 kubelet[1975]: E0209 19:33:41.044750 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.045075 kubelet[1975]: W0209 19:33:41.044759 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.045075 kubelet[1975]: E0209 19:33:41.044771 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.045075 kubelet[1975]: E0209 19:33:41.044887 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.045075 kubelet[1975]: W0209 19:33:41.044896 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.045075 kubelet[1975]: E0209 19:33:41.044907 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.045826 kubelet[1975]: E0209 19:33:41.045801 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.046027 kubelet[1975]: W0209 19:33:41.045999 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.046233 kubelet[1975]: E0209 19:33:41.046208 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.046721 kubelet[1975]: E0209 19:33:41.046688 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.046721 kubelet[1975]: W0209 19:33:41.046701 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.046721 kubelet[1975]: E0209 19:33:41.046715 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.047160 kubelet[1975]: E0209 19:33:41.046981 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:41.047160 kubelet[1975]: W0209 19:33:41.046990 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:41.047160 kubelet[1975]: E0209 19:33:41.047016 1975 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:41.753223 kubelet[1975]: E0209 19:33:41.752261 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:42.290398 env[1054]: time="2024-02-09T19:33:42.290310640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:42.293275 env[1054]: time="2024-02-09T19:33:42.293221941Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:42.296633 env[1054]: time="2024-02-09T19:33:42.296604865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:42.300657 env[1054]: time="2024-02-09T19:33:42.300631208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:42.302125 env[1054]: time="2024-02-09T19:33:42.302097378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:33:42.306226 env[1054]: time="2024-02-09T19:33:42.306122127Z" level=info msg="CreateContainer within sandbox \"6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:33:42.319210 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2450596595.mount: Deactivated successfully. Feb 9 19:33:42.332999 env[1054]: time="2024-02-09T19:33:42.332959845Z" level=info msg="CreateContainer within sandbox \"6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf\"" Feb 9 19:33:42.335225 env[1054]: time="2024-02-09T19:33:42.334051773Z" level=info msg="StartContainer for \"678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf\"" Feb 9 19:33:42.380412 systemd[1]: Started cri-containerd-678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf.scope. Feb 9 19:33:42.398000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.400672 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 19:33:42.400730 kernel: audit: type=1400 audit(1707507222.398:1077): avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.398000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2474 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:42.409683 kernel: audit: type=1300 audit(1707507222.398:1077): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2474 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:42.409754 kernel: audit: type=1327 audit(1707507222.398:1077): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386331343761633438386535653862633131326264313036336466 Feb 9 19:33:42.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386331343761633438386535653862633131326264313036336466 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.418059 kernel: audit: type=1400 audit(1707507222.405:1078): avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.418113 kernel: audit: type=1400 audit(1707507222.405:1078): avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.425047 kernel: audit: type=1400 audit(1707507222.405:1078): avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.428639 kernel: audit: type=1400 audit(1707507222.405:1078): avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.428875 kernel: audit: type=1400 audit(1707507222.405:1078): avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.435620 kernel: audit: type=1400 audit(1707507222.405:1078): avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.439275 kernel: audit: type=1400 audit(1707507222.405:1078): avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.405000 audit: BPF prog-id=139 op=LOAD Feb 9 19:33:42.405000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000308930 items=0 ppid=2474 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:42.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386331343761633438386535653862633131326264313036336466 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.413000 audit: BPF prog-id=140 op=LOAD Feb 9 19:33:42.413000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000308978 items=0 ppid=2474 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:42.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386331343761633438386535653862633131326264313036336466 Feb 9 19:33:42.420000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:33:42.420000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:42.420000 audit: BPF prog-id=141 op=LOAD Feb 9 19:33:42.420000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000308a08 items=0 ppid=2474 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:42.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386331343761633438386535653862633131326264313036336466 Feb 9 19:33:42.459257 env[1054]: time="2024-02-09T19:33:42.459212963Z" level=info msg="StartContainer for \"678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf\" returns successfully" Feb 9 19:33:42.468592 systemd[1]: cri-containerd-678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf.scope: Deactivated successfully. Feb 9 19:33:42.470000 audit: BPF prog-id=141 op=UNLOAD Feb 9 19:33:43.040392 kubelet[1975]: I0209 19:33:43.040313 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5949dcf565-jgrx9" podStartSLOduration=-9.22337202781455e+09 pod.CreationTimestamp="2024-02-09 19:33:34 +0000 UTC" firstStartedPulling="2024-02-09 19:33:34.502235008 +0000 UTC m=+20.193126090" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:33:39.911961784 +0000 UTC m=+25.602852906" watchObservedRunningTime="2024-02-09 19:33:43.040226113 +0000 UTC m=+28.731117245" Feb 9 19:33:43.094256 env[1054]: time="2024-02-09T19:33:43.094036802Z" level=info msg="shim disconnected" id=678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf Feb 9 19:33:43.094256 env[1054]: time="2024-02-09T19:33:43.094103687Z" level=warning msg="cleaning up after shim disconnected" id=678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf namespace=k8s.io Feb 9 19:33:43.094256 env[1054]: time="2024-02-09T19:33:43.094117162Z" level=info msg="cleaning up dead shim" Feb 9 19:33:43.101395 env[1054]: time="2024-02-09T19:33:43.101321575Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:33:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2687 runtime=io.containerd.runc.v2\n" Feb 9 19:33:43.316876 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-678c147ac488e5e8bc112bd1063df1d837bbfd6a065ebcf75ca86d97be286caf-rootfs.mount: Deactivated successfully. Feb 9 19:33:43.754968 kubelet[1975]: E0209 19:33:43.752229 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:43.928269 env[1054]: time="2024-02-09T19:33:43.928063400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:33:45.522510 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2135209627.mount: Deactivated successfully. Feb 9 19:33:45.751547 kubelet[1975]: E0209 19:33:45.751372 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:47.752301 kubelet[1975]: E0209 19:33:47.752255 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:49.752231 kubelet[1975]: E0209 19:33:49.752167 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:51.756322 kubelet[1975]: E0209 19:33:51.751623 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:52.214908 env[1054]: time="2024-02-09T19:33:52.214692953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:52.221336 env[1054]: time="2024-02-09T19:33:52.221245615Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:52.227745 env[1054]: time="2024-02-09T19:33:52.227666139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:52.232466 env[1054]: time="2024-02-09T19:33:52.232379269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:52.236035 env[1054]: time="2024-02-09T19:33:52.235905876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:33:52.245542 env[1054]: time="2024-02-09T19:33:52.245448205Z" level=info msg="CreateContainer within sandbox \"6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:33:52.707609 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1568350833.mount: Deactivated successfully. Feb 9 19:33:52.765663 env[1054]: time="2024-02-09T19:33:52.765506246Z" level=info msg="CreateContainer within sandbox \"6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b\"" Feb 9 19:33:52.767121 env[1054]: time="2024-02-09T19:33:52.767011489Z" level=info msg="StartContainer for \"8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b\"" Feb 9 19:33:52.841780 systemd[1]: run-containerd-runc-k8s.io-8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b-runc.eQOkYT.mount: Deactivated successfully. Feb 9 19:33:52.852249 systemd[1]: Started cri-containerd-8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b.scope. Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.880786 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:33:52.880870 kernel: audit: type=1400 audit(1707507232.878:1084): avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2474 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:52.889880 kernel: audit: type=1300 audit(1707507232.878:1084): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2474 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:52.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643833616531613234343366333537316235633765303734643338 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.906601 kernel: audit: type=1327 audit(1707507232.878:1084): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643833616531613234343366333537316235633765303734643338 Feb 9 19:33:52.906747 kernel: audit: type=1400 audit(1707507232.878:1085): avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.906788 kernel: audit: type=1400 audit(1707507232.878:1085): avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.914255 kernel: audit: type=1400 audit(1707507232.878:1085): avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.918253 kernel: audit: type=1400 audit(1707507232.878:1085): avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.922163 kernel: audit: type=1400 audit(1707507232.878:1085): avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.925688 kernel: audit: type=1400 audit(1707507232.878:1085): avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.929376 kernel: audit: type=1400 audit(1707507232.878:1085): avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.878000 audit: BPF prog-id=142 op=LOAD Feb 9 19:33:52.878000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000286630 items=0 ppid=2474 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:52.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643833616531613234343366333537316235633765303734643338 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.889000 audit: BPF prog-id=143 op=LOAD Feb 9 19:33:52.889000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000286678 items=0 ppid=2474 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:52.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643833616531613234343366333537316235633765303734643338 Feb 9 19:33:52.891000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:33:52.891000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:52.891000 audit: BPF prog-id=144 op=LOAD Feb 9 19:33:52.891000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000286708 items=0 ppid=2474 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:52.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643833616531613234343366333537316235633765303734643338 Feb 9 19:33:53.251979 env[1054]: time="2024-02-09T19:33:53.251707235Z" level=info msg="StartContainer for \"8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b\" returns successfully" Feb 9 19:33:53.751858 kubelet[1975]: E0209 19:33:53.751794 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:54.797130 kubelet[1975]: I0209 19:33:54.797028 1975 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:33:55.752979 kubelet[1975]: E0209 19:33:55.752890 1975 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:56.024000 audit[2761]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:56.024000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd9c5739e0 a2=0 a3=7ffd9c5739cc items=0 ppid=2176 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:56.024000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:56.028000 audit[2761]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:56.028000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd9c5739e0 a2=0 a3=7ffd9c5739cc items=0 ppid=2176 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:56.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:56.647680 env[1054]: time="2024-02-09T19:33:56.647580907Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:33:56.651290 systemd[1]: cri-containerd-8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b.scope: Deactivated successfully. Feb 9 19:33:56.654000 audit: BPF prog-id=144 op=UNLOAD Feb 9 19:33:56.697329 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b-rootfs.mount: Deactivated successfully. Feb 9 19:33:56.725425 kubelet[1975]: I0209 19:33:56.722758 1975 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:33:56.735734 env[1054]: time="2024-02-09T19:33:56.735621693Z" level=info msg="shim disconnected" id=8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b Feb 9 19:33:56.736105 env[1054]: time="2024-02-09T19:33:56.735746598Z" level=warning msg="cleaning up after shim disconnected" id=8ad83ae1a2443f3571b5c7e074d38daf1dcb800c83afc4cc81ca5f6820adec5b namespace=k8s.io Feb 9 19:33:56.736105 env[1054]: time="2024-02-09T19:33:56.735784860Z" level=info msg="cleaning up dead shim" Feb 9 19:33:56.775027 env[1054]: time="2024-02-09T19:33:56.774885742Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:33:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2782 runtime=io.containerd.runc.v2\n" Feb 9 19:33:56.797827 kubelet[1975]: I0209 19:33:56.797784 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:56.814822 systemd[1]: Created slice kubepods-burstable-podd046d62f_2e48_43b1_803d_e95a0548c0f7.slice. Feb 9 19:33:56.824568 kubelet[1975]: I0209 19:33:56.824536 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:56.825681 kubelet[1975]: I0209 19:33:56.825662 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:33:56.830486 systemd[1]: Created slice kubepods-burstable-pod1420d558_f031_40cc_b7af_75679c594e59.slice. Feb 9 19:33:56.836810 systemd[1]: Created slice kubepods-besteffort-pod3840479d_86ff_4672_bf9f_de68b800a299.slice. Feb 9 19:33:56.971056 kubelet[1975]: I0209 19:33:56.970819 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1420d558-f031-40cc-b7af-75679c594e59-config-volume\") pod \"coredns-787d4945fb-wnc76\" (UID: \"1420d558-f031-40cc-b7af-75679c594e59\") " pod="kube-system/coredns-787d4945fb-wnc76" Feb 9 19:33:56.971525 kubelet[1975]: I0209 19:33:56.971494 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fvkbp\" (UniqueName: \"kubernetes.io/projected/d046d62f-2e48-43b1-803d-e95a0548c0f7-kube-api-access-fvkbp\") pod \"coredns-787d4945fb-46rlc\" (UID: \"d046d62f-2e48-43b1-803d-e95a0548c0f7\") " pod="kube-system/coredns-787d4945fb-46rlc" Feb 9 19:33:56.971810 kubelet[1975]: I0209 19:33:56.971782 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3840479d-86ff-4672-bf9f-de68b800a299-tigera-ca-bundle\") pod \"calico-kube-controllers-66f9b49756-h59kx\" (UID: \"3840479d-86ff-4672-bf9f-de68b800a299\") " pod="calico-system/calico-kube-controllers-66f9b49756-h59kx" Feb 9 19:33:56.972218 kubelet[1975]: I0209 19:33:56.972188 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mf4q\" (UniqueName: \"kubernetes.io/projected/3840479d-86ff-4672-bf9f-de68b800a299-kube-api-access-7mf4q\") pod \"calico-kube-controllers-66f9b49756-h59kx\" (UID: \"3840479d-86ff-4672-bf9f-de68b800a299\") " pod="calico-system/calico-kube-controllers-66f9b49756-h59kx" Feb 9 19:33:56.972502 kubelet[1975]: I0209 19:33:56.972472 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qrjbt\" (UniqueName: \"kubernetes.io/projected/1420d558-f031-40cc-b7af-75679c594e59-kube-api-access-qrjbt\") pod \"coredns-787d4945fb-wnc76\" (UID: \"1420d558-f031-40cc-b7af-75679c594e59\") " pod="kube-system/coredns-787d4945fb-wnc76" Feb 9 19:33:56.972808 kubelet[1975]: I0209 19:33:56.972782 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d046d62f-2e48-43b1-803d-e95a0548c0f7-config-volume\") pod \"coredns-787d4945fb-46rlc\" (UID: \"d046d62f-2e48-43b1-803d-e95a0548c0f7\") " pod="kube-system/coredns-787d4945fb-46rlc" Feb 9 19:33:57.142772 env[1054]: time="2024-02-09T19:33:57.142573057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f9b49756-h59kx,Uid:3840479d-86ff-4672-bf9f-de68b800a299,Namespace:calico-system,Attempt:0,}" Feb 9 19:33:57.281190 env[1054]: time="2024-02-09T19:33:57.281087680Z" level=error msg="Failed to destroy network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.282032 env[1054]: time="2024-02-09T19:33:57.281972685Z" level=error msg="encountered an error cleaning up failed sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.282809 env[1054]: time="2024-02-09T19:33:57.282746351Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f9b49756-h59kx,Uid:3840479d-86ff-4672-bf9f-de68b800a299,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.285819 kubelet[1975]: E0209 19:33:57.285765 1975 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.286192 kubelet[1975]: E0209 19:33:57.286113 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-66f9b49756-h59kx" Feb 9 19:33:57.286567 kubelet[1975]: E0209 19:33:57.286434 1975 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-66f9b49756-h59kx" Feb 9 19:33:57.286944 kubelet[1975]: E0209 19:33:57.286745 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-66f9b49756-h59kx_calico-system(3840479d-86ff-4672-bf9f-de68b800a299)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-66f9b49756-h59kx_calico-system(3840479d-86ff-4672-bf9f-de68b800a299)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-66f9b49756-h59kx" podUID=3840479d-86ff-4672-bf9f-de68b800a299 Feb 9 19:33:57.287531 env[1054]: time="2024-02-09T19:33:57.287500374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:33:57.421010 env[1054]: time="2024-02-09T19:33:57.420239101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-46rlc,Uid:d046d62f-2e48-43b1-803d-e95a0548c0f7,Namespace:kube-system,Attempt:0,}" Feb 9 19:33:57.436301 env[1054]: time="2024-02-09T19:33:57.436227518Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wnc76,Uid:1420d558-f031-40cc-b7af-75679c594e59,Namespace:kube-system,Attempt:0,}" Feb 9 19:33:57.571753 env[1054]: time="2024-02-09T19:33:57.571602174Z" level=error msg="Failed to destroy network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.572024 env[1054]: time="2024-02-09T19:33:57.571987789Z" level=error msg="Failed to destroy network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.572785 env[1054]: time="2024-02-09T19:33:57.572743210Z" level=error msg="encountered an error cleaning up failed sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.572849 env[1054]: time="2024-02-09T19:33:57.572806900Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-46rlc,Uid:d046d62f-2e48-43b1-803d-e95a0548c0f7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.572909 env[1054]: time="2024-02-09T19:33:57.572766705Z" level=error msg="encountered an error cleaning up failed sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.572996 env[1054]: time="2024-02-09T19:33:57.572957263Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wnc76,Uid:1420d558-f031-40cc-b7af-75679c594e59,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.573328 kubelet[1975]: E0209 19:33:57.573142 1975 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.573328 kubelet[1975]: E0209 19:33:57.573150 1975 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.573328 kubelet[1975]: E0209 19:33:57.573203 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-46rlc" Feb 9 19:33:57.573328 kubelet[1975]: E0209 19:33:57.573208 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-wnc76" Feb 9 19:33:57.573505 kubelet[1975]: E0209 19:33:57.573232 1975 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-46rlc" Feb 9 19:33:57.573505 kubelet[1975]: E0209 19:33:57.573237 1975 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-wnc76" Feb 9 19:33:57.573505 kubelet[1975]: E0209 19:33:57.573291 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-46rlc_kube-system(d046d62f-2e48-43b1-803d-e95a0548c0f7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-46rlc_kube-system(d046d62f-2e48-43b1-803d-e95a0548c0f7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-46rlc" podUID=d046d62f-2e48-43b1-803d-e95a0548c0f7 Feb 9 19:33:57.573687 kubelet[1975]: E0209 19:33:57.573291 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-wnc76_kube-system(1420d558-f031-40cc-b7af-75679c594e59)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-wnc76_kube-system(1420d558-f031-40cc-b7af-75679c594e59)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-wnc76" podUID=1420d558-f031-40cc-b7af-75679c594e59 Feb 9 19:33:57.700174 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0-shm.mount: Deactivated successfully. Feb 9 19:33:57.764446 systemd[1]: Created slice kubepods-besteffort-pod9f8d9fa7_839c_4971_b751_a94db83544a4.slice. Feb 9 19:33:57.771401 env[1054]: time="2024-02-09T19:33:57.771309572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fh9p,Uid:9f8d9fa7-839c-4971-b751-a94db83544a4,Namespace:calico-system,Attempt:0,}" Feb 9 19:33:57.915926 env[1054]: time="2024-02-09T19:33:57.913320181Z" level=error msg="Failed to destroy network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.915621 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a-shm.mount: Deactivated successfully. Feb 9 19:33:57.917827 env[1054]: time="2024-02-09T19:33:57.917776995Z" level=error msg="encountered an error cleaning up failed sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.918000 env[1054]: time="2024-02-09T19:33:57.917955641Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fh9p,Uid:9f8d9fa7-839c-4971-b751-a94db83544a4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.918842 kubelet[1975]: E0209 19:33:57.918395 1975 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:57.918842 kubelet[1975]: E0209 19:33:57.918468 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2fh9p" Feb 9 19:33:57.918842 kubelet[1975]: E0209 19:33:57.918513 1975 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2fh9p" Feb 9 19:33:57.919315 kubelet[1975]: E0209 19:33:57.918569 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2fh9p_calico-system(9f8d9fa7-839c-4971-b751-a94db83544a4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2fh9p_calico-system(9f8d9fa7-839c-4971-b751-a94db83544a4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:58.287462 kubelet[1975]: I0209 19:33:58.286992 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:33:58.292476 env[1054]: time="2024-02-09T19:33:58.292407874Z" level=info msg="StopPodSandbox for \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\"" Feb 9 19:33:58.293785 kubelet[1975]: I0209 19:33:58.293731 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:33:58.296541 env[1054]: time="2024-02-09T19:33:58.296398490Z" level=info msg="StopPodSandbox for \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\"" Feb 9 19:33:58.307528 kubelet[1975]: I0209 19:33:58.307448 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:33:58.312949 env[1054]: time="2024-02-09T19:33:58.308821679Z" level=info msg="StopPodSandbox for \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\"" Feb 9 19:33:58.318856 kubelet[1975]: I0209 19:33:58.318785 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:33:58.323406 env[1054]: time="2024-02-09T19:33:58.320468768Z" level=info msg="StopPodSandbox for \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\"" Feb 9 19:33:58.400198 env[1054]: time="2024-02-09T19:33:58.400124023Z" level=error msg="StopPodSandbox for \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\" failed" error="failed to destroy network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:58.400817 kubelet[1975]: E0209 19:33:58.400514 1975 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:33:58.400817 kubelet[1975]: E0209 19:33:58.400597 1975 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b} Feb 9 19:33:58.400817 kubelet[1975]: E0209 19:33:58.400739 1975 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1420d558-f031-40cc-b7af-75679c594e59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:33:58.400817 kubelet[1975]: E0209 19:33:58.400780 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1420d558-f031-40cc-b7af-75679c594e59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-wnc76" podUID=1420d558-f031-40cc-b7af-75679c594e59 Feb 9 19:33:58.411597 env[1054]: time="2024-02-09T19:33:58.411527202Z" level=error msg="StopPodSandbox for \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\" failed" error="failed to destroy network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:58.412197 kubelet[1975]: E0209 19:33:58.411963 1975 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:33:58.412197 kubelet[1975]: E0209 19:33:58.412036 1975 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0} Feb 9 19:33:58.412197 kubelet[1975]: E0209 19:33:58.412118 1975 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3840479d-86ff-4672-bf9f-de68b800a299\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:33:58.412197 kubelet[1975]: E0209 19:33:58.412158 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3840479d-86ff-4672-bf9f-de68b800a299\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-66f9b49756-h59kx" podUID=3840479d-86ff-4672-bf9f-de68b800a299 Feb 9 19:33:58.425373 env[1054]: time="2024-02-09T19:33:58.425311882Z" level=error msg="StopPodSandbox for \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\" failed" error="failed to destroy network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:58.425990 kubelet[1975]: E0209 19:33:58.425787 1975 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:33:58.425990 kubelet[1975]: E0209 19:33:58.425849 1975 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a} Feb 9 19:33:58.425990 kubelet[1975]: E0209 19:33:58.425896 1975 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9f8d9fa7-839c-4971-b751-a94db83544a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:33:58.425990 kubelet[1975]: E0209 19:33:58.425961 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9f8d9fa7-839c-4971-b751-a94db83544a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2fh9p" podUID=9f8d9fa7-839c-4971-b751-a94db83544a4 Feb 9 19:33:58.439013 env[1054]: time="2024-02-09T19:33:58.438893319Z" level=error msg="StopPodSandbox for \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\" failed" error="failed to destroy network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:58.439612 kubelet[1975]: E0209 19:33:58.439415 1975 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:33:58.439612 kubelet[1975]: E0209 19:33:58.439483 1975 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a} Feb 9 19:33:58.439612 kubelet[1975]: E0209 19:33:58.439537 1975 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d046d62f-2e48-43b1-803d-e95a0548c0f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:33:58.439612 kubelet[1975]: E0209 19:33:58.439593 1975 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d046d62f-2e48-43b1-803d-e95a0548c0f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-46rlc" podUID=d046d62f-2e48-43b1-803d-e95a0548c0f7 Feb 9 19:34:04.367000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:04.371080 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 19:34:04.371252 kernel: audit: type=1400 audit(1707507244.367:1093): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:04.368000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:04.387956 kernel: audit: type=1400 audit(1707507244.368:1094): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:04.368000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f27740 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:04.409537 kernel: audit: type=1300 audit(1707507244.368:1094): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f27740 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:04.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:04.421114 kernel: audit: type=1327 audit(1707507244.368:1094): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:04.367000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cb4060 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:04.433976 kernel: audit: type=1300 audit(1707507244.367:1093): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cb4060 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:04.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:04.442956 kernel: audit: type=1327 audit(1707507244.367:1093): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:07.388184 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4060976587.mount: Deactivated successfully. Feb 9 19:34:07.462000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.462000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.473879 kernel: audit: type=1400 audit(1707507247.462:1095): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.474088 kernel: audit: type=1400 audit(1707507247.462:1096): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.474164 kernel: audit: type=1300 audit(1707507247.462:1096): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002a5d5c0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:34:07.462000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002a5d5c0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:34:07.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:34:07.496844 kernel: audit: type=1327 audit(1707507247.462:1096): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:34:07.462000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ad9be30 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:34:07.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:34:07.475000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.475000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c001088f30 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:34:07.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:34:07.485000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.485000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c001089290 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:34:07.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:34:07.511168 env[1054]: time="2024-02-09T19:34:07.511124893Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:07.516069 env[1054]: time="2024-02-09T19:34:07.516023442Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:07.519358 env[1054]: time="2024-02-09T19:34:07.519317755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:07.522319 env[1054]: time="2024-02-09T19:34:07.522256840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:07.523359 env[1054]: time="2024-02-09T19:34:07.523327673Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:34:07.533000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.533000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002a5dfa0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:34:07.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:34:07.534000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:07.534000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c000d06ea0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:34:07.534000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:34:07.553114 env[1054]: time="2024-02-09T19:34:07.553073000Z" level=info msg="CreateContainer within sandbox \"6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:34:07.589133 env[1054]: time="2024-02-09T19:34:07.589086100Z" level=info msg="CreateContainer within sandbox \"6e89587d659710f9268731f0cbf31696430d05eb9da31e6bcf2c44b6336766a5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca\"" Feb 9 19:34:07.591350 env[1054]: time="2024-02-09T19:34:07.591314700Z" level=info msg="StartContainer for \"7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca\"" Feb 9 19:34:07.624698 systemd[1]: Started cri-containerd-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca.scope. Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2474 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765376235636164393863343066613936653766643932323364303339 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.655000 audit: BPF prog-id=145 op=LOAD Feb 9 19:34:07.655000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000358200 items=0 ppid=2474 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765376235636164393863343066613936653766643932323364303339 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit: BPF prog-id=146 op=LOAD Feb 9 19:34:07.657000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000358248 items=0 ppid=2474 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765376235636164393863343066613936653766643932323364303339 Feb 9 19:34:07.657000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:34:07.657000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.657000 audit: BPF prog-id=147 op=LOAD Feb 9 19:34:07.657000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003582d8 items=0 ppid=2474 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765376235636164393863343066613936653766643932323364303339 Feb 9 19:34:07.682639 env[1054]: time="2024-02-09T19:34:07.682574627Z" level=info msg="StartContainer for \"7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca\" returns successfully" Feb 9 19:34:07.836731 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:34:07.837060 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:34:08.412018 kubelet[1975]: I0209 19:34:08.411987 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-zq5xd" podStartSLOduration=-9.223372002448174e+09 pod.CreationTimestamp="2024-02-09 19:33:34 +0000 UTC" firstStartedPulling="2024-02-09 19:33:34.877766073 +0000 UTC m=+20.568657165" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:08.405272025 +0000 UTC m=+54.096163117" watchObservedRunningTime="2024-02-09 19:34:08.406602756 +0000 UTC m=+54.097493838" Feb 9 19:34:08.423827 systemd[1]: run-containerd-runc-k8s.io-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca-runc.xVuwdt.mount: Deactivated successfully. Feb 9 19:34:08.755806 env[1054]: time="2024-02-09T19:34:08.755709897Z" level=info msg="StopPodSandbox for \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\"" Feb 9 19:34:09.327000 audit[3160]: AVC avc: denied { write } for pid=3160 comm="tee" name="fd" dev="proc" ino=27224 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.327000 audit[3160]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb14a4952 a2=241 a3=1b6 items=1 ppid=3117 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.327000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:34:09.327000 audit: PATH item=0 name="/dev/fd/63" inode=26536 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.328000 audit[3162]: AVC avc: denied { write } for pid=3162 comm="tee" name="fd" dev="proc" ino=27228 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.372905 kernel: kauditd_printk_skb: 87 callbacks suppressed Feb 9 19:34:09.373076 kernel: audit: type=1400 audit(1707507249.369:1113): avc: denied { write } for pid=3188 comm="tee" name="fd" dev="proc" ino=27240 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.328000 audit[3162]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd51677961 a2=241 a3=1b6 items=1 ppid=3128 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.328000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:34:09.328000 audit: PATH item=0 name="/dev/fd/63" inode=26537 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.327000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.352000 audit[3164]: AVC avc: denied { write } for pid=3164 comm="tee" name="fd" dev="proc" ino=26555 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.352000 audit[3164]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2e264963 a2=241 a3=1b6 items=1 ppid=3130 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.357000 audit[3169]: AVC avc: denied { write } for pid=3169 comm="tee" name="fd" dev="proc" ino=27232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.357000 audit[3169]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc733d961 a2=241 a3=1b6 items=1 ppid=3125 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.357000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:34:09.357000 audit: PATH item=0 name="/dev/fd/63" inode=26547 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.357000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.352000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:34:09.352000 audit: PATH item=0 name="/dev/fd/63" inode=27221 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.364000 audit[3167]: AVC avc: denied { write } for pid=3167 comm="tee" name="fd" dev="proc" ino=26568 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.366000 audit[3178]: AVC avc: denied { write } for pid=3178 comm="tee" name="fd" dev="proc" ino=27236 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.366000 audit[3178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa76bb961 a2=241 a3=1b6 items=1 ppid=3119 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.366000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:34:09.366000 audit: PATH item=0 name="/dev/fd/63" inode=26550 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.364000 audit[3167]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2e410951 a2=241 a3=1b6 items=1 ppid=3121 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.364000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:34:09.364000 audit: PATH item=0 name="/dev/fd/63" inode=26544 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.369000 audit[3188]: AVC avc: denied { write } for pid=3188 comm="tee" name="fd" dev="proc" ino=27240 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:09.369000 audit[3188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea327e962 a2=241 a3=1b6 items=1 ppid=3123 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.383247 kernel: audit: type=1300 audit(1707507249.369:1113): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea327e962 a2=241 a3=1b6 items=1 ppid=3123 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.369000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:34:09.395948 kernel: audit: type=1307 audit(1707507249.369:1113): cwd="/etc/service/enabled/bird/log" Feb 9 19:34:09.369000 audit: PATH item=0 name="/dev/fd/63" inode=26562 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.401962 kernel: audit: type=1302 audit(1707507249.369:1113): item=0 name="/dev/fd/63" inode=26562 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:09.369000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.407957 kernel: audit: type=1327 audit(1707507249.369:1113): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.031 [INFO][3099] k8s.go 578: Cleaning up netns ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.033 [INFO][3099] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" iface="eth0" netns="/var/run/netns/cni-c2e68c44-6460-13f3-4455-9af847fb3e48" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.034 [INFO][3099] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" iface="eth0" netns="/var/run/netns/cni-c2e68c44-6460-13f3-4455-9af847fb3e48" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.037 [INFO][3099] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" iface="eth0" netns="/var/run/netns/cni-c2e68c44-6460-13f3-4455-9af847fb3e48" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.037 [INFO][3099] k8s.go 585: Releasing IP address(es) ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.037 [INFO][3099] utils.go 188: Calico CNI releasing IP address ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.858 [INFO][3105] ipam_plugin.go 415: Releasing address using handleID ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.860 [INFO][3105] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.860 [INFO][3105] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.884 [WARNING][3105] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.884 [INFO][3105] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.887 [INFO][3105] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:09.890838 env[1054]: 2024-02-09 19:34:09.888 [INFO][3099] k8s.go 591: Teardown processing complete. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:09.892032 env[1054]: time="2024-02-09T19:34:09.891368525Z" level=info msg="TearDown network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\" successfully" Feb 9 19:34:09.892032 env[1054]: time="2024-02-09T19:34:09.891400916Z" level=info msg="StopPodSandbox for \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\" returns successfully" Feb 9 19:34:09.893493 systemd[1]: run-netns-cni\x2dc2e68c44\x2d6460\x2d13f3\x2d4455\x2d9af847fb3e48.mount: Deactivated successfully. Feb 9 19:34:09.897430 env[1054]: time="2024-02-09T19:34:09.897388711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f9b49756-h59kx,Uid:3840479d-86ff-4672-bf9f-de68b800a299,Namespace:calico-system,Attempt:1,}" Feb 9 19:34:10.741108 systemd-networkd[977]: cali4d56dbd12d5: Link UP Feb 9 19:34:10.746457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:10.746534 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4d56dbd12d5: link becomes ready Feb 9 19:34:10.743582 systemd-networkd[977]: cali4d56dbd12d5: Gained carrier Feb 9 19:34:10.754908 env[1054]: time="2024-02-09T19:34:10.754207302Z" level=info msg="StopPodSandbox for \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\"" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.133 [INFO][3228] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0 calico-kube-controllers-66f9b49756- calico-system 3840479d-86ff-4672-bf9f-de68b800a299 699 0 2024-02-09 19:33:34 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:66f9b49756 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-2-2-bf9c3542bb.novalocal calico-kube-controllers-66f9b49756-h59kx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4d56dbd12d5 [] []}} ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.134 [INFO][3228] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.197 [INFO][3247] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" HandleID="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.212 [INFO][3247] ipam_plugin.go 268: Auto assigning IP ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" HandleID="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002908b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-2-bf9c3542bb.novalocal", "pod":"calico-kube-controllers-66f9b49756-h59kx", "timestamp":"2024-02-09 19:34:10.197465893 +0000 UTC"}, Hostname:"ci-3510-3-2-2-bf9c3542bb.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.212 [INFO][3247] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.212 [INFO][3247] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.212 [INFO][3247] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-2-bf9c3542bb.novalocal' Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.216 [INFO][3247] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.504 [INFO][3247] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.509 [INFO][3247] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.597 [INFO][3247] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.656 [INFO][3247] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.656 [INFO][3247] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.659 [INFO][3247] ipam.go 1682: Creating new handle: k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.666 [INFO][3247] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.691 [INFO][3247] ipam.go 1216: Successfully claimed IPs: [192.168.64.193/26] block=192.168.64.192/26 handle="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.692 [INFO][3247] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.193/26] handle="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.692 [INFO][3247] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:10.766943 env[1054]: 2024-02-09 19:34:10.692 [INFO][3247] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.193/26] IPv6=[] ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" HandleID="k8s-pod-network.c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:10.769357 env[1054]: 2024-02-09 19:34:10.698 [INFO][3228] k8s.go 385: Populated endpoint ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0", GenerateName:"calico-kube-controllers-66f9b49756-", Namespace:"calico-system", SelfLink:"", UID:"3840479d-86ff-4672-bf9f-de68b800a299", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f9b49756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"", Pod:"calico-kube-controllers-66f9b49756-h59kx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d56dbd12d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:10.769357 env[1054]: 2024-02-09 19:34:10.699 [INFO][3228] k8s.go 386: Calico CNI using IPs: [192.168.64.193/32] ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:10.769357 env[1054]: 2024-02-09 19:34:10.699 [INFO][3228] dataplane_linux.go 68: Setting the host side veth name to cali4d56dbd12d5 ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:10.769357 env[1054]: 2024-02-09 19:34:10.740 [INFO][3228] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:10.769357 env[1054]: 2024-02-09 19:34:10.743 [INFO][3228] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0", GenerateName:"calico-kube-controllers-66f9b49756-", Namespace:"calico-system", SelfLink:"", UID:"3840479d-86ff-4672-bf9f-de68b800a299", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f9b49756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d", Pod:"calico-kube-controllers-66f9b49756-h59kx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d56dbd12d5", MAC:"2a:4c:cc:f2:ba:cb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:10.769357 env[1054]: 2024-02-09 19:34:10.764 [INFO][3228] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d" Namespace="calico-system" Pod="calico-kube-controllers-66f9b49756-h59kx" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:10.825447 env[1054]: time="2024-02-09T19:34:10.825302048Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:10.826537 env[1054]: time="2024-02-09T19:34:10.826500840Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:10.827491 env[1054]: time="2024-02-09T19:34:10.826668806Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:10.829293 env[1054]: time="2024-02-09T19:34:10.829253836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d pid=3328 runtime=io.containerd.runc.v2 Feb 9 19:34:10.851280 systemd[1]: Started cri-containerd-c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d.scope. Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.966231 kernel: audit: type=1400 audit(1707507250.924:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.966535 kernel: audit: type=1400 audit(1707507250.924:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.966596 kernel: audit: type=1400 audit(1707507250.924:1116): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.966675 kernel: audit: type=1400 audit(1707507250.924:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.966712 kernel: audit: type=1400 audit(1707507250.924:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.925000 audit: BPF prog-id=148 op=LOAD Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3328 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:10.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386139646631616164623931633735663235336135633632376330 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3328 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:10.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386139646631616164623931633735663235336135633632376330 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.930000 audit: BPF prog-id=149 op=LOAD Feb 9 19:34:10.930000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d8360 items=0 ppid=3328 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:10.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386139646631616164623931633735663235336135633632376330 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.941000 audit: BPF prog-id=150 op=LOAD Feb 9 19:34:10.941000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d83a8 items=0 ppid=3328 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:10.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386139646631616164623931633735663235336135633632376330 Feb 9 19:34:10.945000 audit: BPF prog-id=150 op=UNLOAD Feb 9 19:34:10.945000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:10.945000 audit: BPF prog-id=151 op=LOAD Feb 9 19:34:10.945000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d87b8 items=0 ppid=3328 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:10.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386139646631616164623931633735663235336135633632376330 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.025000 audit: BPF prog-id=152 op=LOAD Feb 9 19:34:11.025000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec20d0bd0 a2=70 a3=7f0bd733e000 items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.025000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.026000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit: BPF prog-id=153 op=LOAD Feb 9 19:34:11.026000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec20d0bd0 a2=70 a3=6e items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.026000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.026000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec20d0b80 a2=70 a3=470860 items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.026000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.026000 audit: BPF prog-id=154 op=LOAD Feb 9 19:34:11.026000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffec20d0b60 a2=70 a3=7ffec20d0bd0 items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.026000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.034000 audit: BPF prog-id=154 op=UNLOAD Feb 9 19:34:11.034000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.034000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec20d0c40 a2=70 a3=0 items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.034000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.034000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec20d0c30 a2=70 a3=0 items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.034000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.034000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffec20d0c70 a2=70 a3=fe00 items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.046000 audit: BPF prog-id=155 op=LOAD Feb 9 19:34:11.046000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffec20d0b90 a2=70 a3=ffffffff items=0 ppid=3120 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:11.061000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.061000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9a45b5f0 a2=70 a3=ffff items=0 ppid=3120 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:34:11.061000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.061000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9a45b4c0 a2=70 a3=3 items=0 ppid=3120 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:34:11.068468 env[1054]: time="2024-02-09T19:34:11.036221549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f9b49756-h59kx,Uid:3840479d-86ff-4672-bf9f-de68b800a299,Namespace:calico-system,Attempt:1,} returns sandbox id \"c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d\"" Feb 9 19:34:11.068468 env[1054]: time="2024-02-09T19:34:11.048553216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:10.875 [INFO][3312] k8s.go 578: Cleaning up netns ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:10.876 [INFO][3312] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" iface="eth0" netns="/var/run/netns/cni-874b7246-0120-af63-d2d7-efd40909229c" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:10.876 [INFO][3312] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" iface="eth0" netns="/var/run/netns/cni-874b7246-0120-af63-d2d7-efd40909229c" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:10.876 [INFO][3312] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" iface="eth0" netns="/var/run/netns/cni-874b7246-0120-af63-d2d7-efd40909229c" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:10.876 [INFO][3312] k8s.go 585: Releasing IP address(es) ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:10.876 [INFO][3312] utils.go 188: Calico CNI releasing IP address ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:11.034 [INFO][3350] ipam_plugin.go 415: Releasing address using handleID ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:11.035 [INFO][3350] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:11.036 [INFO][3350] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:11.059 [WARNING][3350] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:11.059 [INFO][3350] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:11.066 [INFO][3350] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:11.072791 env[1054]: 2024-02-09 19:34:11.071 [INFO][3312] k8s.go 591: Teardown processing complete. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:11.083000 audit: BPF prog-id=155 op=UNLOAD Feb 9 19:34:11.087677 env[1054]: time="2024-02-09T19:34:11.073497187Z" level=info msg="TearDown network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\" successfully" Feb 9 19:34:11.087677 env[1054]: time="2024-02-09T19:34:11.073533385Z" level=info msg="StopPodSandbox for \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\" returns successfully" Feb 9 19:34:11.087677 env[1054]: time="2024-02-09T19:34:11.078176833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wnc76,Uid:1420d558-f031-40cc-b7af-75679c594e59,Namespace:kube-system,Attempt:1,}" Feb 9 19:34:11.077822 systemd[1]: run-netns-cni\x2d874b7246\x2d0120\x2daf63\x2dd2d7\x2defd40909229c.mount: Deactivated successfully. Feb 9 19:34:11.196333 systemd-networkd[977]: vxlan.calico: Link UP Feb 9 19:34:11.196348 systemd-networkd[977]: vxlan.calico: Gained carrier Feb 9 19:34:11.301000 audit[3422]: NETFILTER_CFG table=raw:111 family=2 entries=19 op=nft_register_chain pid=3422 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:11.301000 audit[3422]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff043fa2b0 a2=0 a3=7fff043fa29c items=0 ppid=3120 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.301000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:11.317000 audit[3423]: NETFILTER_CFG table=mangle:112 family=2 entries=19 op=nft_register_chain pid=3423 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:11.317000 audit[3423]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff752b6db0 a2=0 a3=7fff752b6d9c items=0 ppid=3120 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.317000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:11.332000 audit[3426]: NETFILTER_CFG table=nat:113 family=2 entries=16 op=nft_register_chain pid=3426 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:11.332000 audit[3426]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc156e9ea0 a2=0 a3=7ffc156e9e8c items=0 ppid=3120 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:11.335000 audit[3425]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=3425 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:11.335000 audit[3425]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc2d97bcb0 a2=0 a3=0 items=0 ppid=3120 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.335000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:11.416000 audit[3443]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=3443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:11.416000 audit[3443]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff5140fdd0 a2=0 a3=7fff5140fdbc items=0 ppid=3120 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.416000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:11.437473 systemd-networkd[977]: cali58c5c078456: Link UP Feb 9 19:34:11.440115 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali58c5c078456: link becomes ready Feb 9 19:34:11.440294 systemd-networkd[977]: cali58c5c078456: Gained carrier Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.295 [INFO][3403] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0 coredns-787d4945fb- kube-system 1420d558-f031-40cc-b7af-75679c594e59 710 0 2024-02-09 19:33:26 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-2-bf9c3542bb.novalocal coredns-787d4945fb-wnc76 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali58c5c078456 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.295 [INFO][3403] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.354 [INFO][3428] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" HandleID="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.374 [INFO][3428] ipam_plugin.go 268: Auto assigning IP ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" HandleID="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c840), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-2-bf9c3542bb.novalocal", "pod":"coredns-787d4945fb-wnc76", "timestamp":"2024-02-09 19:34:11.354904611 +0000 UTC"}, Hostname:"ci-3510-3-2-2-bf9c3542bb.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.374 [INFO][3428] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.375 [INFO][3428] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.375 [INFO][3428] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-2-bf9c3542bb.novalocal' Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.378 [INFO][3428] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.386 [INFO][3428] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.393 [INFO][3428] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.396 [INFO][3428] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.402 [INFO][3428] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.402 [INFO][3428] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.408 [INFO][3428] ipam.go 1682: Creating new handle: k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0 Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.414 [INFO][3428] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.429 [INFO][3428] ipam.go 1216: Successfully claimed IPs: [192.168.64.194/26] block=192.168.64.192/26 handle="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.430 [INFO][3428] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.194/26] handle="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.430 [INFO][3428] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:11.462049 env[1054]: 2024-02-09 19:34:11.430 [INFO][3428] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.194/26] IPv6=[] ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" HandleID="k8s-pod-network.d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.462900 env[1054]: 2024-02-09 19:34:11.432 [INFO][3403] k8s.go 385: Populated endpoint ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1420d558-f031-40cc-b7af-75679c594e59", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"", Pod:"coredns-787d4945fb-wnc76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali58c5c078456", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:11.462900 env[1054]: 2024-02-09 19:34:11.432 [INFO][3403] k8s.go 386: Calico CNI using IPs: [192.168.64.194/32] ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.462900 env[1054]: 2024-02-09 19:34:11.432 [INFO][3403] dataplane_linux.go 68: Setting the host side veth name to cali58c5c078456 ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.462900 env[1054]: 2024-02-09 19:34:11.441 [INFO][3403] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.462900 env[1054]: 2024-02-09 19:34:11.444 [INFO][3403] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1420d558-f031-40cc-b7af-75679c594e59", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0", Pod:"coredns-787d4945fb-wnc76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali58c5c078456", MAC:"3e:55:9f:81:1b:ef", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:11.462900 env[1054]: 2024-02-09 19:34:11.459 [INFO][3403] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0" Namespace="kube-system" Pod="coredns-787d4945fb-wnc76" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:11.489000 audit[3459]: NETFILTER_CFG table=filter:116 family=2 entries=40 op=nft_register_chain pid=3459 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:11.489000 audit[3459]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffdd9e1f9c0 a2=0 a3=7ffdd9e1f9ac items=0 ppid=3120 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.489000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:11.502613 env[1054]: time="2024-02-09T19:34:11.502547609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:11.502793 env[1054]: time="2024-02-09T19:34:11.502768464Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:11.502908 env[1054]: time="2024-02-09T19:34:11.502885183Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:11.503336 env[1054]: time="2024-02-09T19:34:11.503294252Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0 pid=3469 runtime=io.containerd.runc.v2 Feb 9 19:34:11.520705 systemd[1]: Started cri-containerd-d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0.scope. Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.548000 audit: BPF prog-id=156 op=LOAD Feb 9 19:34:11.549000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.549000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3469 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666533316533336263633863366337393361663262646265353764 Feb 9 19:34:11.549000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.549000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3469 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666533316533336263633863366337393361663262646265353764 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.550000 audit: BPF prog-id=157 op=LOAD Feb 9 19:34:11.550000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025050 items=0 ppid=3469 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666533316533336263633863366337393361663262646265353764 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.557000 audit: BPF prog-id=158 op=LOAD Feb 9 19:34:11.557000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025098 items=0 ppid=3469 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666533316533336263633863366337393361663262646265353764 Feb 9 19:34:11.558000 audit: BPF prog-id=158 op=UNLOAD Feb 9 19:34:11.558000 audit: BPF prog-id=157 op=UNLOAD Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.558000 audit: BPF prog-id=159 op=LOAD Feb 9 19:34:11.558000 audit[3479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000254a8 items=0 ppid=3469 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666533316533336263633863366337393361663262646265353764 Feb 9 19:34:11.596950 env[1054]: time="2024-02-09T19:34:11.596886385Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wnc76,Uid:1420d558-f031-40cc-b7af-75679c594e59,Namespace:kube-system,Attempt:1,} returns sandbox id \"d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0\"" Feb 9 19:34:11.600640 env[1054]: time="2024-02-09T19:34:11.600608030Z" level=info msg="CreateContainer within sandbox \"d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:34:11.688875 env[1054]: time="2024-02-09T19:34:11.688835710Z" level=info msg="CreateContainer within sandbox \"d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dfcc2dd592551c7243114f37923d1b699f6fb0d8327a4b4e549c77d237a66962\"" Feb 9 19:34:11.690136 env[1054]: time="2024-02-09T19:34:11.690082643Z" level=info msg="StartContainer for \"dfcc2dd592551c7243114f37923d1b699f6fb0d8327a4b4e549c77d237a66962\"" Feb 9 19:34:11.718996 systemd[1]: Started cri-containerd-dfcc2dd592551c7243114f37923d1b699f6fb0d8327a4b4e549c77d237a66962.scope. Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.737000 audit: BPF prog-id=160 op=LOAD Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3469 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636332646435393235353163373234333131346633373932336431 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3469 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636332646435393235353163373234333131346633373932336431 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit: BPF prog-id=161 op=LOAD Feb 9 19:34:11.738000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000332ec0 items=0 ppid=3469 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636332646435393235353163373234333131346633373932336431 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit: BPF prog-id=162 op=LOAD Feb 9 19:34:11.738000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000332f08 items=0 ppid=3469 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636332646435393235353163373234333131346633373932336431 Feb 9 19:34:11.738000 audit: BPF prog-id=162 op=UNLOAD Feb 9 19:34:11.738000 audit: BPF prog-id=161 op=UNLOAD Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:11.738000 audit: BPF prog-id=163 op=LOAD Feb 9 19:34:11.738000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000333318 items=0 ppid=3469 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:11.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636332646435393235353163373234333131346633373932336431 Feb 9 19:34:11.754778 env[1054]: time="2024-02-09T19:34:11.754731017Z" level=info msg="StopPodSandbox for \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\"" Feb 9 19:34:11.960105 env[1054]: time="2024-02-09T19:34:11.955239274Z" level=info msg="StartContainer for \"dfcc2dd592551c7243114f37923d1b699f6fb0d8327a4b4e549c77d237a66962\" returns successfully" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.826 [INFO][3546] k8s.go 578: Cleaning up netns ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.826 [INFO][3546] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" iface="eth0" netns="/var/run/netns/cni-7e303690-03ba-c4d3-31da-7fd86988cff0" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.827 [INFO][3546] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" iface="eth0" netns="/var/run/netns/cni-7e303690-03ba-c4d3-31da-7fd86988cff0" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.828 [INFO][3546] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" iface="eth0" netns="/var/run/netns/cni-7e303690-03ba-c4d3-31da-7fd86988cff0" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.828 [INFO][3546] k8s.go 585: Releasing IP address(es) ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.828 [INFO][3546] utils.go 188: Calico CNI releasing IP address ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.946 [INFO][3552] ipam_plugin.go 415: Releasing address using handleID ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.947 [INFO][3552] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.947 [INFO][3552] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.977 [WARNING][3552] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.978 [INFO][3552] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.981 [INFO][3552] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:11.988549 env[1054]: 2024-02-09 19:34:11.985 [INFO][3546] k8s.go 591: Teardown processing complete. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:11.992153 env[1054]: time="2024-02-09T19:34:11.988827140Z" level=info msg="TearDown network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\" successfully" Feb 9 19:34:11.992153 env[1054]: time="2024-02-09T19:34:11.988891050Z" level=info msg="StopPodSandbox for \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\" returns successfully" Feb 9 19:34:11.992153 env[1054]: time="2024-02-09T19:34:11.989970509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-46rlc,Uid:d046d62f-2e48-43b1-803d-e95a0548c0f7,Namespace:kube-system,Attempt:1,}" Feb 9 19:34:11.999071 systemd[1]: run-netns-cni\x2d7e303690\x2d03ba\x2dc4d3\x2d31da\x2d7fd86988cff0.mount: Deactivated successfully. Feb 9 19:34:12.319355 systemd-networkd[977]: vxlan.calico: Gained IPv6LL Feb 9 19:34:12.472471 kubelet[1975]: I0209 19:34:12.472421 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-wnc76" podStartSLOduration=46.472339605 pod.CreationTimestamp="2024-02-09 19:33:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:12.471262602 +0000 UTC m=+58.162153764" watchObservedRunningTime="2024-02-09 19:34:12.472339605 +0000 UTC m=+58.163230738" Feb 9 19:34:12.511270 systemd-networkd[977]: cali4d56dbd12d5: Gained IPv6LL Feb 9 19:34:12.681000 audit[3603]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=3603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:12.681000 audit[3603]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fffae676d40 a2=0 a3=7fffae676d2c items=0 ppid=2176 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:12.682000 audit[3603]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=3603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:12.682000 audit[3603]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fffae676d40 a2=0 a3=7fffae676d2c items=0 ppid=2176 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:12.727846 systemd-networkd[977]: cali43ee7e53956: Link UP Feb 9 19:34:12.730044 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:12.730116 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali43ee7e53956: link becomes ready Feb 9 19:34:12.730228 systemd-networkd[977]: cali43ee7e53956: Gained carrier Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.635 [INFO][3559] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0 coredns-787d4945fb- kube-system d046d62f-2e48-43b1-803d-e95a0548c0f7 719 0 2024-02-09 19:33:26 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-2-bf9c3542bb.novalocal coredns-787d4945fb-46rlc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali43ee7e53956 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.636 [INFO][3559] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.676 [INFO][3592] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" HandleID="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.693 [INFO][3592] ipam_plugin.go 268: Auto assigning IP ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" HandleID="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002befe0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-2-bf9c3542bb.novalocal", "pod":"coredns-787d4945fb-46rlc", "timestamp":"2024-02-09 19:34:12.676614111 +0000 UTC"}, Hostname:"ci-3510-3-2-2-bf9c3542bb.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.693 [INFO][3592] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.693 [INFO][3592] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.694 [INFO][3592] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-2-bf9c3542bb.novalocal' Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.695 [INFO][3592] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.699 [INFO][3592] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.703 [INFO][3592] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.705 [INFO][3592] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.707 [INFO][3592] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.707 [INFO][3592] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.709 [INFO][3592] ipam.go 1682: Creating new handle: k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40 Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.713 [INFO][3592] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.718 [INFO][3592] ipam.go 1216: Successfully claimed IPs: [192.168.64.195/26] block=192.168.64.192/26 handle="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.718 [INFO][3592] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.195/26] handle="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.718 [INFO][3592] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:12.747494 env[1054]: 2024-02-09 19:34:12.718 [INFO][3592] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.195/26] IPv6=[] ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" HandleID="k8s-pod-network.286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:12.751293 env[1054]: 2024-02-09 19:34:12.721 [INFO][3559] k8s.go 385: Populated endpoint ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d046d62f-2e48-43b1-803d-e95a0548c0f7", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"", Pod:"coredns-787d4945fb-46rlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43ee7e53956", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:12.751293 env[1054]: 2024-02-09 19:34:12.721 [INFO][3559] k8s.go 386: Calico CNI using IPs: [192.168.64.195/32] ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:12.751293 env[1054]: 2024-02-09 19:34:12.721 [INFO][3559] dataplane_linux.go 68: Setting the host side veth name to cali43ee7e53956 ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:12.751293 env[1054]: 2024-02-09 19:34:12.730 [INFO][3559] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:12.751293 env[1054]: 2024-02-09 19:34:12.736 [INFO][3559] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d046d62f-2e48-43b1-803d-e95a0548c0f7", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40", Pod:"coredns-787d4945fb-46rlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43ee7e53956", MAC:"fa:0f:7e:28:88:dd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:12.751293 env[1054]: 2024-02-09 19:34:12.745 [INFO][3559] k8s.go 491: Wrote updated endpoint to datastore ContainerID="286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40" Namespace="kube-system" Pod="coredns-787d4945fb-46rlc" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:12.766000 audit[3619]: NETFILTER_CFG table=filter:119 family=2 entries=40 op=nft_register_chain pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:12.766000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=20752 a0=3 a1=7fff7ff317d0 a2=0 a3=7fff7ff317bc items=0 ppid=3120 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.766000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:12.776183 env[1054]: time="2024-02-09T19:34:12.776102716Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:12.776392 env[1054]: time="2024-02-09T19:34:12.776366181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:12.776508 env[1054]: time="2024-02-09T19:34:12.776486547Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:12.776826 env[1054]: time="2024-02-09T19:34:12.776787933Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40 pid=3627 runtime=io.containerd.runc.v2 Feb 9 19:34:12.797375 systemd[1]: Started cri-containerd-286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40.scope. Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.814000 audit: BPF prog-id=164 op=LOAD Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3627 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366632323464383632643530613338383564656532353533343264 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3627 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366632323464383632643530613338383564656532353533343264 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit: BPF prog-id=165 op=LOAD Feb 9 19:34:12.815000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003daa50 items=0 ppid=3627 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366632323464383632643530613338383564656532353533343264 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.815000 audit: BPF prog-id=166 op=LOAD Feb 9 19:34:12.815000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003daa98 items=0 ppid=3627 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366632323464383632643530613338383564656532353533343264 Feb 9 19:34:12.816000 audit: BPF prog-id=166 op=UNLOAD Feb 9 19:34:12.816000 audit: BPF prog-id=165 op=UNLOAD Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.816000 audit: BPF prog-id=167 op=LOAD Feb 9 19:34:12.816000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003daea8 items=0 ppid=3627 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366632323464383632643530613338383564656532353533343264 Feb 9 19:34:12.831183 systemd-networkd[977]: cali58c5c078456: Gained IPv6LL Feb 9 19:34:12.854685 env[1054]: time="2024-02-09T19:34:12.854626421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-46rlc,Uid:d046d62f-2e48-43b1-803d-e95a0548c0f7,Namespace:kube-system,Attempt:1,} returns sandbox id \"286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40\"" Feb 9 19:34:12.860751 env[1054]: time="2024-02-09T19:34:12.860702269Z" level=info msg="CreateContainer within sandbox \"286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:34:13.117552 env[1054]: time="2024-02-09T19:34:13.117442215Z" level=info msg="CreateContainer within sandbox \"286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6061568c7d134f6ae1872742117488eefb4c0af039ae2eb1805d031f5dbceac3\"" Feb 9 19:34:13.119689 env[1054]: time="2024-02-09T19:34:13.119635206Z" level=info msg="StartContainer for \"6061568c7d134f6ae1872742117488eefb4c0af039ae2eb1805d031f5dbceac3\"" Feb 9 19:34:13.182574 systemd[1]: Started cri-containerd-6061568c7d134f6ae1872742117488eefb4c0af039ae2eb1805d031f5dbceac3.scope. Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.216000 audit: BPF prog-id=168 op=LOAD Feb 9 19:34:13.216000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.216000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3627 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:13.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363135363863376431333466366165313837323734323131373438 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3627 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:13.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363135363863376431333466366165313837323734323131373438 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.217000 audit: BPF prog-id=169 op=LOAD Feb 9 19:34:13.217000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025450 items=0 ppid=3627 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:13.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363135363863376431333466366165313837323734323131373438 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.218000 audit: BPF prog-id=170 op=LOAD Feb 9 19:34:13.218000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025498 items=0 ppid=3627 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:13.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363135363863376431333466366165313837323734323131373438 Feb 9 19:34:13.219000 audit: BPF prog-id=170 op=UNLOAD Feb 9 19:34:13.219000 audit: BPF prog-id=169 op=UNLOAD Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:13.219000 audit: BPF prog-id=171 op=LOAD Feb 9 19:34:13.219000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000258a8 items=0 ppid=3627 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:13.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363135363863376431333466366165313837323734323131373438 Feb 9 19:34:13.245377 env[1054]: time="2024-02-09T19:34:13.245283001Z" level=info msg="StartContainer for \"6061568c7d134f6ae1872742117488eefb4c0af039ae2eb1805d031f5dbceac3\" returns successfully" Feb 9 19:34:13.647000 audit[3726]: NETFILTER_CFG table=filter:120 family=2 entries=12 op=nft_register_rule pid=3726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:13.647000 audit[3726]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc9e11df00 a2=0 a3=7ffc9e11deec items=0 ppid=2176 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:13.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:13.648000 audit[3726]: NETFILTER_CFG table=nat:121 family=2 entries=30 op=nft_register_rule pid=3726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:13.648000 audit[3726]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffc9e11df00 a2=0 a3=7ffc9e11deec items=0 ppid=2176 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:13.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:13.752786 env[1054]: time="2024-02-09T19:34:13.752749076Z" level=info msg="StopPodSandbox for \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\"" Feb 9 19:34:14.077953 systemd[1]: run-containerd-runc-k8s.io-6061568c7d134f6ae1872742117488eefb4c0af039ae2eb1805d031f5dbceac3-runc.jqpVSZ.mount: Deactivated successfully. Feb 9 19:34:14.104809 kubelet[1975]: I0209 19:34:14.104638 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-46rlc" podStartSLOduration=48.104599607 pod.CreationTimestamp="2024-02-09 19:33:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:13.541841665 +0000 UTC m=+59.232732797" watchObservedRunningTime="2024-02-09 19:34:14.104599607 +0000 UTC m=+59.795490689" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.102 [INFO][3741] k8s.go 578: Cleaning up netns ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.102 [INFO][3741] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" iface="eth0" netns="/var/run/netns/cni-ebf895d6-4ed9-65b9-4103-034e80ace49c" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.102 [INFO][3741] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" iface="eth0" netns="/var/run/netns/cni-ebf895d6-4ed9-65b9-4103-034e80ace49c" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.102 [INFO][3741] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" iface="eth0" netns="/var/run/netns/cni-ebf895d6-4ed9-65b9-4103-034e80ace49c" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.103 [INFO][3741] k8s.go 585: Releasing IP address(es) ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.103 [INFO][3741] utils.go 188: Calico CNI releasing IP address ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.143 [INFO][3747] ipam_plugin.go 415: Releasing address using handleID ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.143 [INFO][3747] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.143 [INFO][3747] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.156 [WARNING][3747] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.156 [INFO][3747] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.161 [INFO][3747] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:14.165700 env[1054]: 2024-02-09 19:34:14.163 [INFO][3741] k8s.go 591: Teardown processing complete. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:34:14.172732 env[1054]: time="2024-02-09T19:34:14.169871103Z" level=info msg="TearDown network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\" successfully" Feb 9 19:34:14.172732 env[1054]: time="2024-02-09T19:34:14.170005587Z" level=info msg="StopPodSandbox for \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\" returns successfully" Feb 9 19:34:14.172732 env[1054]: time="2024-02-09T19:34:14.171071309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fh9p,Uid:9f8d9fa7-839c-4971-b751-a94db83544a4,Namespace:calico-system,Attempt:1,}" Feb 9 19:34:14.168278 systemd[1]: run-netns-cni\x2debf895d6\x2d4ed9\x2d65b9\x2d4103\x2d034e80ace49c.mount: Deactivated successfully. Feb 9 19:34:14.239278 systemd-networkd[977]: cali43ee7e53956: Gained IPv6LL Feb 9 19:34:14.772700 systemd-networkd[977]: calia1839f304a7: Link UP Feb 9 19:34:14.776098 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:14.776227 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia1839f304a7: link becomes ready Feb 9 19:34:14.776333 systemd-networkd[977]: calia1839f304a7: Gained carrier Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.294 [INFO][3753] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0 csi-node-driver- calico-system 9f8d9fa7-839c-4971-b751-a94db83544a4 740 0 2024-02-09 19:33:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-2-2-bf9c3542bb.novalocal csi-node-driver-2fh9p eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia1839f304a7 [] []}} ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.295 [INFO][3753] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.350 [INFO][3765] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" HandleID="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.368 [INFO][3765] ipam_plugin.go 268: Auto assigning IP ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" HandleID="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290be0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-2-bf9c3542bb.novalocal", "pod":"csi-node-driver-2fh9p", "timestamp":"2024-02-09 19:34:14.350740338 +0000 UTC"}, Hostname:"ci-3510-3-2-2-bf9c3542bb.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.368 [INFO][3765] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.368 [INFO][3765] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.369 [INFO][3765] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-2-bf9c3542bb.novalocal' Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.371 [INFO][3765] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.378 [INFO][3765] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.384 [INFO][3765] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.386 [INFO][3765] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.389 [INFO][3765] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.389 [INFO][3765] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.399 [INFO][3765] ipam.go 1682: Creating new handle: k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.406 [INFO][3765] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.756 [INFO][3765] ipam.go 1216: Successfully claimed IPs: [192.168.64.196/26] block=192.168.64.192/26 handle="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.756 [INFO][3765] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.196/26] handle="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.757 [INFO][3765] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:14.803543 env[1054]: 2024-02-09 19:34:14.757 [INFO][3765] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.196/26] IPv6=[] ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" HandleID="k8s-pod-network.7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.805064 env[1054]: 2024-02-09 19:34:14.762 [INFO][3753] k8s.go 385: Populated endpoint ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9f8d9fa7-839c-4971-b751-a94db83544a4", ResourceVersion:"740", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"", Pod:"csi-node-driver-2fh9p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia1839f304a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:14.805064 env[1054]: 2024-02-09 19:34:14.763 [INFO][3753] k8s.go 386: Calico CNI using IPs: [192.168.64.196/32] ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.805064 env[1054]: 2024-02-09 19:34:14.763 [INFO][3753] dataplane_linux.go 68: Setting the host side veth name to calia1839f304a7 ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.805064 env[1054]: 2024-02-09 19:34:14.777 [INFO][3753] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.805064 env[1054]: 2024-02-09 19:34:14.777 [INFO][3753] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9f8d9fa7-839c-4971-b751-a94db83544a4", ResourceVersion:"740", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d", Pod:"csi-node-driver-2fh9p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia1839f304a7", MAC:"12:01:07:6a:c4:c9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:14.805064 env[1054]: 2024-02-09 19:34:14.797 [INFO][3753] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d" Namespace="calico-system" Pod="csi-node-driver-2fh9p" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:34:14.827962 env[1054]: time="2024-02-09T19:34:14.827883594Z" level=info msg="StopPodSandbox for \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\"" Feb 9 19:34:14.890242 env[1054]: time="2024-02-09T19:34:14.888158982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:14.890242 env[1054]: time="2024-02-09T19:34:14.888225958Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:14.890242 env[1054]: time="2024-02-09T19:34:14.888240775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:14.890242 env[1054]: time="2024-02-09T19:34:14.888384175Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d pid=3801 runtime=io.containerd.runc.v2 Feb 9 19:34:14.941947 systemd[1]: Started cri-containerd-7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d.scope. Feb 9 19:34:14.974000 audit[3832]: NETFILTER_CFG table=filter:122 family=2 entries=38 op=nft_register_chain pid=3832 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:14.984820 kernel: kauditd_printk_skb: 384 callbacks suppressed Feb 9 19:34:14.984886 kernel: audit: type=1325 audit(1707507254.974:1229): table=filter:122 family=2 entries=38 op=nft_register_chain pid=3832 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:14.984930 kernel: audit: type=1300 audit(1707507254.974:1229): arch=c000003e syscall=46 success=yes exit=19492 a0=3 a1=7ffc399d3ba0 a2=0 a3=7ffc399d3b8c items=0 ppid=3120 pid=3832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:14.974000 audit[3832]: SYSCALL arch=c000003e syscall=46 success=yes exit=19492 a0=3 a1=7ffc399d3ba0 a2=0 a3=7ffc399d3b8c items=0 ppid=3120 pid=3832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:14.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:14.990945 kernel: audit: type=1327 audit(1707507254.974:1229): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.013946 kernel: audit: type=1400 audit(1707507255.007:1230): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.039374 kernel: audit: type=1400 audit(1707507255.007:1231): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.039432 kernel: audit: type=1400 audit(1707507255.007:1232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.039476 kernel: audit: type=1400 audit(1707507255.007:1233): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.039502 kernel: audit: type=1400 audit(1707507255.007:1234): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.039523 kernel: audit: type=1400 audit(1707507255.007:1235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.048971 kernel: audit: type=1400 audit(1707507255.007:1236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.009000 audit: BPF prog-id=172 op=LOAD Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3801 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766333134666131363237623364373765623662646263656130326165 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3801 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766333134666131363237623364373765623662646263656130326165 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.014000 audit: BPF prog-id=173 op=LOAD Feb 9 19:34:15.014000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003085e0 items=0 ppid=3801 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766333134666131363237623364373765623662646263656130326165 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit: BPF prog-id=174 op=LOAD Feb 9 19:34:15.017000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308628 items=0 ppid=3801 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766333134666131363237623364373765623662646263656130326165 Feb 9 19:34:15.017000 audit: BPF prog-id=174 op=UNLOAD Feb 9 19:34:15.017000 audit: BPF prog-id=173 op=UNLOAD Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:15.017000 audit: BPF prog-id=175 op=LOAD Feb 9 19:34:15.017000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000308a38 items=0 ppid=3801 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766333134666131363237623364373765623662646263656130326165 Feb 9 19:34:15.072535 env[1054]: time="2024-02-09T19:34:15.072485398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fh9p,Uid:9f8d9fa7-839c-4971-b751-a94db83544a4,Namespace:calico-system,Attempt:1,} returns sandbox id \"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d\"" Feb 9 19:34:15.179000 audit[3873]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=3873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:15.179000 audit[3873]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe5e3676b0 a2=0 a3=7ffe5e36769c items=0 ppid=2176 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:15.182000 audit[3873]: NETFILTER_CFG table=nat:124 family=2 entries=51 op=nft_register_chain pid=3873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:15.182000 audit[3873]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe5e3676b0 a2=0 a3=7ffe5e36769c items=0 ppid=2176 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.278 [WARNING][3811] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0", GenerateName:"calico-kube-controllers-66f9b49756-", Namespace:"calico-system", SelfLink:"", UID:"3840479d-86ff-4672-bf9f-de68b800a299", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f9b49756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d", Pod:"calico-kube-controllers-66f9b49756-h59kx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d56dbd12d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.278 [INFO][3811] k8s.go 578: Cleaning up netns ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.278 [INFO][3811] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" iface="eth0" netns="" Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.278 [INFO][3811] k8s.go 585: Releasing IP address(es) ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.278 [INFO][3811] utils.go 188: Calico CNI releasing IP address ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.329 [INFO][3875] ipam_plugin.go 415: Releasing address using handleID ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.329 [INFO][3875] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.329 [INFO][3875] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.452 [WARNING][3875] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.452 [INFO][3875] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.458 [INFO][3875] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:15.465845 env[1054]: 2024-02-09 19:34:15.463 [INFO][3811] k8s.go 591: Teardown processing complete. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.467183 env[1054]: time="2024-02-09T19:34:15.467128566Z" level=info msg="TearDown network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\" successfully" Feb 9 19:34:15.467358 env[1054]: time="2024-02-09T19:34:15.467314316Z" level=info msg="StopPodSandbox for \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\" returns successfully" Feb 9 19:34:15.508970 env[1054]: time="2024-02-09T19:34:15.508728537Z" level=info msg="RemovePodSandbox for \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\"" Feb 9 19:34:15.508970 env[1054]: time="2024-02-09T19:34:15.508770405Z" level=info msg="Forcibly stopping sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\"" Feb 9 19:34:15.598000 audit[3926]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:15.598000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff4a86ffd0 a2=0 a3=7fff4a86ffbc items=0 ppid=2176 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:15.607000 audit[3926]: NETFILTER_CFG table=nat:126 family=2 entries=72 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:15.607000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff4a86ffd0 a2=0 a3=7fff4a86ffbc items=0 ppid=2176 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:15.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.595 [WARNING][3897] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0", GenerateName:"calico-kube-controllers-66f9b49756-", Namespace:"calico-system", SelfLink:"", UID:"3840479d-86ff-4672-bf9f-de68b800a299", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f9b49756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d", Pod:"calico-kube-controllers-66f9b49756-h59kx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d56dbd12d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.595 [INFO][3897] k8s.go 578: Cleaning up netns ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.596 [INFO][3897] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" iface="eth0" netns="" Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.596 [INFO][3897] k8s.go 585: Releasing IP address(es) ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.596 [INFO][3897] utils.go 188: Calico CNI releasing IP address ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.640 [INFO][3925] ipam_plugin.go 415: Releasing address using handleID ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.640 [INFO][3925] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.640 [INFO][3925] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.649 [WARNING][3925] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.649 [INFO][3925] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" HandleID="k8s-pod-network.b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--kube--controllers--66f9b49756--h59kx-eth0" Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.652 [INFO][3925] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:15.656009 env[1054]: 2024-02-09 19:34:15.654 [INFO][3897] k8s.go 591: Teardown processing complete. ContainerID="b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0" Feb 9 19:34:15.656601 env[1054]: time="2024-02-09T19:34:15.656561698Z" level=info msg="TearDown network for sandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\" successfully" Feb 9 19:34:15.805061 env[1054]: time="2024-02-09T19:34:15.805019903Z" level=info msg="RemovePodSandbox \"b511e53076b308493b68807156f04950bd54cfc4be32c598c82a0b1f3bac2bb0\" returns successfully" Feb 9 19:34:15.806263 env[1054]: time="2024-02-09T19:34:15.806205081Z" level=info msg="StopPodSandbox for \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\"" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.887 [WARNING][3948] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1420d558-f031-40cc-b7af-75679c594e59", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0", Pod:"coredns-787d4945fb-wnc76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali58c5c078456", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.887 [INFO][3948] k8s.go 578: Cleaning up netns ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.887 [INFO][3948] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" iface="eth0" netns="" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.887 [INFO][3948] k8s.go 585: Releasing IP address(es) ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.887 [INFO][3948] utils.go 188: Calico CNI releasing IP address ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.930 [INFO][3954] ipam_plugin.go 415: Releasing address using handleID ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.931 [INFO][3954] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.931 [INFO][3954] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.943 [WARNING][3954] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.943 [INFO][3954] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.949 [INFO][3954] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:15.955277 env[1054]: 2024-02-09 19:34:15.951 [INFO][3948] k8s.go 591: Teardown processing complete. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:15.956249 env[1054]: time="2024-02-09T19:34:15.955294283Z" level=info msg="TearDown network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\" successfully" Feb 9 19:34:15.956249 env[1054]: time="2024-02-09T19:34:15.955331803Z" level=info msg="StopPodSandbox for \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\" returns successfully" Feb 9 19:34:15.956701 env[1054]: time="2024-02-09T19:34:15.956663366Z" level=info msg="RemovePodSandbox for \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\"" Feb 9 19:34:15.956841 env[1054]: time="2024-02-09T19:34:15.956795553Z" level=info msg="Forcibly stopping sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\"" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.016 [WARNING][3974] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1420d558-f031-40cc-b7af-75679c594e59", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"d0fe31e33bcc8c6c793af2bdbe57d7343903db31e7773b1b0f657a9e77da2bd0", Pod:"coredns-787d4945fb-wnc76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali58c5c078456", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.016 [INFO][3974] k8s.go 578: Cleaning up netns ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.016 [INFO][3974] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" iface="eth0" netns="" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.016 [INFO][3974] k8s.go 585: Releasing IP address(es) ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.016 [INFO][3974] utils.go 188: Calico CNI releasing IP address ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.044 [INFO][3980] ipam_plugin.go 415: Releasing address using handleID ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.044 [INFO][3980] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.045 [INFO][3980] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.055 [WARNING][3980] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.055 [INFO][3980] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" HandleID="k8s-pod-network.2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--wnc76-eth0" Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.056 [INFO][3980] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:16.060038 env[1054]: 2024-02-09 19:34:16.058 [INFO][3974] k8s.go 591: Teardown processing complete. ContainerID="2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b" Feb 9 19:34:16.061812 env[1054]: time="2024-02-09T19:34:16.060633629Z" level=info msg="TearDown network for sandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\" successfully" Feb 9 19:34:16.064581 env[1054]: time="2024-02-09T19:34:16.064551852Z" level=info msg="RemovePodSandbox \"2dccffcaa9af4a07c9e4423fafea6b03c07541c422b19d5a6a5b152b268f198b\" returns successfully" Feb 9 19:34:16.065140 env[1054]: time="2024-02-09T19:34:16.065116042Z" level=info msg="StopPodSandbox for \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\"" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.126 [WARNING][4001] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d046d62f-2e48-43b1-803d-e95a0548c0f7", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40", Pod:"coredns-787d4945fb-46rlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43ee7e53956", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.127 [INFO][4001] k8s.go 578: Cleaning up netns ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.127 [INFO][4001] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" iface="eth0" netns="" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.127 [INFO][4001] k8s.go 585: Releasing IP address(es) ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.127 [INFO][4001] utils.go 188: Calico CNI releasing IP address ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.165 [INFO][4007] ipam_plugin.go 415: Releasing address using handleID ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.165 [INFO][4007] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.165 [INFO][4007] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.176 [WARNING][4007] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.176 [INFO][4007] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.324 [INFO][4007] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:16.332501 env[1054]: 2024-02-09 19:34:16.329 [INFO][4001] k8s.go 591: Teardown processing complete. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.332501 env[1054]: time="2024-02-09T19:34:16.332395370Z" level=info msg="TearDown network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\" successfully" Feb 9 19:34:16.332501 env[1054]: time="2024-02-09T19:34:16.332427370Z" level=info msg="StopPodSandbox for \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\" returns successfully" Feb 9 19:34:16.334691 env[1054]: time="2024-02-09T19:34:16.334622355Z" level=info msg="RemovePodSandbox for \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\"" Feb 9 19:34:16.335040 env[1054]: time="2024-02-09T19:34:16.334871172Z" level=info msg="Forcibly stopping sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\"" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.407 [WARNING][4028] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d046d62f-2e48-43b1-803d-e95a0548c0f7", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"286f224d862d50a3885dee255342d5be10541c42fcb25edda5bd13fcc69fda40", Pod:"coredns-787d4945fb-46rlc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali43ee7e53956", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.407 [INFO][4028] k8s.go 578: Cleaning up netns ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.407 [INFO][4028] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" iface="eth0" netns="" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.407 [INFO][4028] k8s.go 585: Releasing IP address(es) ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.407 [INFO][4028] utils.go 188: Calico CNI releasing IP address ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.434 [INFO][4034] ipam_plugin.go 415: Releasing address using handleID ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.435 [INFO][4034] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.435 [INFO][4034] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.502 [WARNING][4034] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.502 [INFO][4034] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" HandleID="k8s-pod-network.1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-coredns--787d4945fb--46rlc-eth0" Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.506 [INFO][4034] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:16.510294 env[1054]: 2024-02-09 19:34:16.508 [INFO][4028] k8s.go 591: Teardown processing complete. ContainerID="1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a" Feb 9 19:34:16.510902 env[1054]: time="2024-02-09T19:34:16.510869153Z" level=info msg="TearDown network for sandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\" successfully" Feb 9 19:34:16.543386 systemd-networkd[977]: calia1839f304a7: Gained IPv6LL Feb 9 19:34:16.859450 env[1054]: time="2024-02-09T19:34:16.859367692Z" level=info msg="RemovePodSandbox \"1e03dd09915c39f8830ab9f05434e0fab038a0a980452e23cf42a36cf668d35a\" returns successfully" Feb 9 19:34:16.988464 env[1054]: time="2024-02-09T19:34:16.988412398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:16.992402 env[1054]: time="2024-02-09T19:34:16.992355828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:16.996695 env[1054]: time="2024-02-09T19:34:16.996663582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:17.000454 env[1054]: time="2024-02-09T19:34:17.000425190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:17.002324 env[1054]: time="2024-02-09T19:34:17.002281678Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:34:17.003396 env[1054]: time="2024-02-09T19:34:17.003369512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:34:17.032061 env[1054]: time="2024-02-09T19:34:17.032018811Z" level=info msg="CreateContainer within sandbox \"c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:34:17.048168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1220153473.mount: Deactivated successfully. Feb 9 19:34:17.057754 env[1054]: time="2024-02-09T19:34:17.057716155Z" level=info msg="CreateContainer within sandbox \"c68a9df1aadb91c75f253a5c627c0c6dcadde3d68c395e4c27e9cc9e0463a24d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677\"" Feb 9 19:34:17.059835 env[1054]: time="2024-02-09T19:34:17.059760225Z" level=info msg="StartContainer for \"9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677\"" Feb 9 19:34:17.097283 systemd[1]: Started cri-containerd-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677.scope. Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.114000 audit: BPF prog-id=176 op=LOAD Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3328 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964653064326638383266623330623937643930373962323139613930 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3328 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964653064326638383266623330623937643930373962323139613930 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit: BPF prog-id=177 op=LOAD Feb 9 19:34:17.115000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003be920 items=0 ppid=3328 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964653064326638383266623330623937643930373962323139613930 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.115000 audit: BPF prog-id=178 op=LOAD Feb 9 19:34:17.115000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003be968 items=0 ppid=3328 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964653064326638383266623330623937643930373962323139613930 Feb 9 19:34:17.118000 audit: BPF prog-id=178 op=UNLOAD Feb 9 19:34:17.118000 audit: BPF prog-id=177 op=UNLOAD Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.118000 audit: BPF prog-id=179 op=LOAD Feb 9 19:34:17.118000 audit[4055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003bed78 items=0 ppid=3328 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964653064326638383266623330623937643930373962323139613930 Feb 9 19:34:17.160766 env[1054]: time="2024-02-09T19:34:17.160701135Z" level=info msg="StartContainer for \"9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677\" returns successfully" Feb 9 19:34:17.643464 kubelet[1975]: I0209 19:34:17.643415 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-66f9b49756-h59kx" podStartSLOduration=-9.22337199321142e+09 pod.CreationTimestamp="2024-02-09 19:33:34 +0000 UTC" firstStartedPulling="2024-02-09 19:34:11.047850255 +0000 UTC m=+56.738741347" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:17.569452566 +0000 UTC m=+63.260343668" watchObservedRunningTime="2024-02-09 19:34:17.643356356 +0000 UTC m=+63.334247438" Feb 9 19:34:18.519848 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount865031551.mount: Deactivated successfully. Feb 9 19:34:19.175382 env[1054]: time="2024-02-09T19:34:19.175297401Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.178439 env[1054]: time="2024-02-09T19:34:19.178270607Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.181560 env[1054]: time="2024-02-09T19:34:19.181360262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.185834 env[1054]: time="2024-02-09T19:34:19.185728308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.187683 env[1054]: time="2024-02-09T19:34:19.187597801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:34:19.195050 env[1054]: time="2024-02-09T19:34:19.193893950Z" level=info msg="CreateContainer within sandbox \"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:34:19.225556 env[1054]: time="2024-02-09T19:34:19.225478590Z" level=info msg="CreateContainer within sandbox \"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"32fbfd84f4814eab50fe33ef22408916a570710ac23b2521e80c83548ba430cc\"" Feb 9 19:34:19.227989 env[1054]: time="2024-02-09T19:34:19.226222297Z" level=info msg="StartContainer for \"32fbfd84f4814eab50fe33ef22408916a570710ac23b2521e80c83548ba430cc\"" Feb 9 19:34:19.232551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1964290699.mount: Deactivated successfully. Feb 9 19:34:19.286447 systemd[1]: run-containerd-runc-k8s.io-32fbfd84f4814eab50fe33ef22408916a570710ac23b2521e80c83548ba430cc-runc.Mm9nBk.mount: Deactivated successfully. Feb 9 19:34:19.290157 systemd[1]: Started cri-containerd-32fbfd84f4814eab50fe33ef22408916a570710ac23b2521e80c83548ba430cc.scope. Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3801 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332666266643834663438313465616235306665333365663232343038 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit: BPF prog-id=180 op=LOAD Feb 9 19:34:19.350000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003b4350 items=0 ppid=3801 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332666266643834663438313465616235306665333365663232343038 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit: BPF prog-id=181 op=LOAD Feb 9 19:34:19.350000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003b4398 items=0 ppid=3801 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332666266643834663438313465616235306665333365663232343038 Feb 9 19:34:19.350000 audit: BPF prog-id=181 op=UNLOAD Feb 9 19:34:19.350000 audit: BPF prog-id=180 op=UNLOAD Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.350000 audit: BPF prog-id=182 op=LOAD Feb 9 19:34:19.350000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003b4428 items=0 ppid=3801 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332666266643834663438313465616235306665333365663232343038 Feb 9 19:34:19.401646 env[1054]: time="2024-02-09T19:34:19.401568811Z" level=info msg="StartContainer for \"32fbfd84f4814eab50fe33ef22408916a570710ac23b2521e80c83548ba430cc\" returns successfully" Feb 9 19:34:19.413025 env[1054]: time="2024-02-09T19:34:19.412960865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:34:22.200348 env[1054]: time="2024-02-09T19:34:22.200226365Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:22.222204 env[1054]: time="2024-02-09T19:34:22.222069527Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:22.227871 env[1054]: time="2024-02-09T19:34:22.227807166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:22.234289 env[1054]: time="2024-02-09T19:34:22.234221836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:22.235972 env[1054]: time="2024-02-09T19:34:22.235842551Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:34:22.245962 env[1054]: time="2024-02-09T19:34:22.245560406Z" level=info msg="CreateContainer within sandbox \"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:34:22.281207 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2482978821.mount: Deactivated successfully. Feb 9 19:34:22.291327 env[1054]: time="2024-02-09T19:34:22.291248263Z" level=info msg="CreateContainer within sandbox \"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c7a2d20f9a82c0cc9d4fb303bd6c8c881759c5bcaf60dd1d02bd11a74edeafa0\"" Feb 9 19:34:22.294666 env[1054]: time="2024-02-09T19:34:22.293693767Z" level=info msg="StartContainer for \"c7a2d20f9a82c0cc9d4fb303bd6c8c881759c5bcaf60dd1d02bd11a74edeafa0\"" Feb 9 19:34:22.344379 systemd[1]: run-containerd-runc-k8s.io-c7a2d20f9a82c0cc9d4fb303bd6c8c881759c5bcaf60dd1d02bd11a74edeafa0-runc.oEPJWM.mount: Deactivated successfully. Feb 9 19:34:22.351977 systemd[1]: Started cri-containerd-c7a2d20f9a82c0cc9d4fb303bd6c8c881759c5bcaf60dd1d02bd11a74edeafa0.scope. Feb 9 19:34:22.379041 kernel: kauditd_printk_skb: 162 callbacks suppressed Feb 9 19:34:22.379542 kernel: audit: type=1400 audit(1707507262.369:1276): avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.379714 kernel: audit: type=1300 audit(1707507262.369:1276): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3801 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3801 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:22.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613264323066396138326330636339643466623330336264366338 Feb 9 19:34:22.386082 kernel: audit: type=1327 audit(1707507262.369:1276): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613264323066396138326330636339643466623330336264366338 Feb 9 19:34:22.386976 kernel: audit: type=1400 audit(1707507262.369:1277): avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.395266 kernel: audit: type=1400 audit(1707507262.369:1277): avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.395418 kernel: audit: type=1400 audit(1707507262.369:1277): avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.403079 kernel: audit: type=1400 audit(1707507262.369:1277): avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.406957 kernel: audit: type=1400 audit(1707507262.369:1277): avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.410957 kernel: audit: type=1400 audit(1707507262.369:1277): avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit: BPF prog-id=183 op=LOAD Feb 9 19:34:22.414938 kernel: audit: type=1400 audit(1707507262.369:1277): avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.369000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00030d1e0 items=0 ppid=3801 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:22.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613264323066396138326330636339643466623330336264366338 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.370000 audit: BPF prog-id=184 op=LOAD Feb 9 19:34:22.370000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00030d228 items=0 ppid=3801 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:22.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613264323066396138326330636339643466623330336264366338 Feb 9 19:34:22.376000 audit: BPF prog-id=184 op=UNLOAD Feb 9 19:34:22.376000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:22.376000 audit: BPF prog-id=185 op=LOAD Feb 9 19:34:22.376000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00030d2b8 items=0 ppid=3801 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:22.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613264323066396138326330636339643466623330336264366338 Feb 9 19:34:22.526377 env[1054]: time="2024-02-09T19:34:22.526243231Z" level=info msg="StartContainer for \"c7a2d20f9a82c0cc9d4fb303bd6c8c881759c5bcaf60dd1d02bd11a74edeafa0\" returns successfully" Feb 9 19:34:22.595427 kubelet[1975]: I0209 19:34:22.595381 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2fh9p" podStartSLOduration=-9.223371988259472e+09 pod.CreationTimestamp="2024-02-09 19:33:34 +0000 UTC" firstStartedPulling="2024-02-09 19:34:15.115459129 +0000 UTC m=+60.806350211" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:22.591345789 +0000 UTC m=+68.282236891" watchObservedRunningTime="2024-02-09 19:34:22.595302962 +0000 UTC m=+68.286194065" Feb 9 19:34:22.873093 kubelet[1975]: I0209 19:34:22.872961 1975 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:34:22.876898 kubelet[1975]: I0209 19:34:22.876868 1975 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:34:25.615000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:25.615000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:25.615000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00218c3e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:25.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:25.615000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020d6900 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:25.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:25.632000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:25.632000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020d6920 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:25.632000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:25.648000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:34:25.648000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00218c500 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:34:25.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:34:28.974295 kubelet[1975]: I0209 19:34:28.974241 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:34:28.982059 systemd[1]: Created slice kubepods-besteffort-pod535d7352_a17f_46c8_9d91_dd084fc3bd55.slice. Feb 9 19:34:28.990727 kubelet[1975]: I0209 19:34:28.990699 1975 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:34:28.996706 systemd[1]: Created slice kubepods-besteffort-podd0b7d3e6_4142_44be_bdda_fe3ebe0a7380.slice. Feb 9 19:34:29.056751 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 9 19:34:29.056867 kernel: audit: type=1325 audit(1707507269.051:1286): table=filter:127 family=2 entries=7 op=nft_register_rule pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.051000 audit[4261]: NETFILTER_CFG table=filter:127 family=2 entries=7 op=nft_register_rule pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.051000 audit[4261]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff0a9f4d00 a2=0 a3=7fff0a9f4cec items=0 ppid=2176 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.066364 kernel: audit: type=1300 audit(1707507269.051:1286): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff0a9f4d00 a2=0 a3=7fff0a9f4cec items=0 ppid=2176 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.066465 kernel: audit: type=1327 audit(1707507269.051:1286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:29.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:29.069503 kernel: audit: type=1325 audit(1707507269.064:1287): table=nat:128 family=2 entries=78 op=nft_register_rule pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.064000 audit[4261]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.064000 audit[4261]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff0a9f4d00 a2=0 a3=7fff0a9f4cec items=0 ppid=2176 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.076939 kernel: audit: type=1300 audit(1707507269.064:1287): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff0a9f4d00 a2=0 a3=7fff0a9f4cec items=0 ppid=2176 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:29.081950 kernel: audit: type=1327 audit(1707507269.064:1287): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:29.126812 kubelet[1975]: I0209 19:34:29.126765 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/535d7352-a17f-46c8-9d91-dd084fc3bd55-calico-apiserver-certs\") pod \"calico-apiserver-84fc7756d8-ljv5b\" (UID: \"535d7352-a17f-46c8-9d91-dd084fc3bd55\") " pod="calico-apiserver/calico-apiserver-84fc7756d8-ljv5b" Feb 9 19:34:29.126973 kubelet[1975]: I0209 19:34:29.126854 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d0b7d3e6-4142-44be-bdda-fe3ebe0a7380-calico-apiserver-certs\") pod \"calico-apiserver-84fc7756d8-hv72s\" (UID: \"d0b7d3e6-4142-44be-bdda-fe3ebe0a7380\") " pod="calico-apiserver/calico-apiserver-84fc7756d8-hv72s" Feb 9 19:34:29.126973 kubelet[1975]: I0209 19:34:29.126897 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tx2fb\" (UniqueName: \"kubernetes.io/projected/535d7352-a17f-46c8-9d91-dd084fc3bd55-kube-api-access-tx2fb\") pod \"calico-apiserver-84fc7756d8-ljv5b\" (UID: \"535d7352-a17f-46c8-9d91-dd084fc3bd55\") " pod="calico-apiserver/calico-apiserver-84fc7756d8-ljv5b" Feb 9 19:34:29.127079 kubelet[1975]: I0209 19:34:29.127019 1975 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56lnb\" (UniqueName: \"kubernetes.io/projected/d0b7d3e6-4142-44be-bdda-fe3ebe0a7380-kube-api-access-56lnb\") pod \"calico-apiserver-84fc7756d8-hv72s\" (UID: \"d0b7d3e6-4142-44be-bdda-fe3ebe0a7380\") " pod="calico-apiserver/calico-apiserver-84fc7756d8-hv72s" Feb 9 19:34:29.125000 audit[4287]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.125000 audit[4287]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe27d97760 a2=0 a3=7ffe27d9774c items=0 ppid=2176 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.136126 kernel: audit: type=1325 audit(1707507269.125:1288): table=filter:129 family=2 entries=8 op=nft_register_rule pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.136260 kernel: audit: type=1300 audit(1707507269.125:1288): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe27d97760 a2=0 a3=7ffe27d9774c items=0 ppid=2176 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:29.139121 kernel: audit: type=1327 audit(1707507269.125:1288): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:29.140000 audit[4287]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.140000 audit[4287]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe27d97760 a2=0 a3=7ffe27d9774c items=0 ppid=2176 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:29.144990 kernel: audit: type=1325 audit(1707507269.140:1289): table=nat:130 family=2 entries=78 op=nft_register_rule pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:29.288858 env[1054]: time="2024-02-09T19:34:29.288389085Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84fc7756d8-ljv5b,Uid:535d7352-a17f-46c8-9d91-dd084fc3bd55,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:34:29.299672 env[1054]: time="2024-02-09T19:34:29.299627121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84fc7756d8-hv72s,Uid:d0b7d3e6-4142-44be-bdda-fe3ebe0a7380,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:34:29.666814 systemd-networkd[977]: cali92d41ead365: Link UP Feb 9 19:34:29.672327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:29.672500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali92d41ead365: link becomes ready Feb 9 19:34:29.671946 systemd-networkd[977]: cali92d41ead365: Gained carrier Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.537 [INFO][4292] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0 calico-apiserver-84fc7756d8- calico-apiserver 535d7352-a17f-46c8-9d91-dd084fc3bd55 857 0 2024-02-09 19:34:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84fc7756d8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-2-bf9c3542bb.novalocal calico-apiserver-84fc7756d8-ljv5b eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali92d41ead365 [] []}} ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.537 [INFO][4292] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.599 [INFO][4318] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" HandleID="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.611 [INFO][4318] ipam_plugin.go 268: Auto assigning IP ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" HandleID="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-2-bf9c3542bb.novalocal", "pod":"calico-apiserver-84fc7756d8-ljv5b", "timestamp":"2024-02-09 19:34:29.599590174 +0000 UTC"}, Hostname:"ci-3510-3-2-2-bf9c3542bb.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.611 [INFO][4318] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.611 [INFO][4318] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.612 [INFO][4318] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-2-bf9c3542bb.novalocal' Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.620 [INFO][4318] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.629 [INFO][4318] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.634 [INFO][4318] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.635 [INFO][4318] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.637 [INFO][4318] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.638 [INFO][4318] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.640 [INFO][4318] ipam.go 1682: Creating new handle: k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.644 [INFO][4318] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.651 [INFO][4318] ipam.go 1216: Successfully claimed IPs: [192.168.64.197/26] block=192.168.64.192/26 handle="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.651 [INFO][4318] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.197/26] handle="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.651 [INFO][4318] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:29.690389 env[1054]: 2024-02-09 19:34:29.651 [INFO][4318] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.197/26] IPv6=[] ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" HandleID="k8s-pod-network.d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" Feb 9 19:34:29.691267 env[1054]: 2024-02-09 19:34:29.660 [INFO][4292] k8s.go 385: Populated endpoint ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0", GenerateName:"calico-apiserver-84fc7756d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"535d7352-a17f-46c8-9d91-dd084fc3bd55", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84fc7756d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"", Pod:"calico-apiserver-84fc7756d8-ljv5b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali92d41ead365", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:29.691267 env[1054]: 2024-02-09 19:34:29.660 [INFO][4292] k8s.go 386: Calico CNI using IPs: [192.168.64.197/32] ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" Feb 9 19:34:29.691267 env[1054]: 2024-02-09 19:34:29.660 [INFO][4292] dataplane_linux.go 68: Setting the host side veth name to cali92d41ead365 ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" Feb 9 19:34:29.691267 env[1054]: 2024-02-09 19:34:29.671 [INFO][4292] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" Feb 9 19:34:29.691267 env[1054]: 2024-02-09 19:34:29.677 [INFO][4292] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0", GenerateName:"calico-apiserver-84fc7756d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"535d7352-a17f-46c8-9d91-dd084fc3bd55", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84fc7756d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef", Pod:"calico-apiserver-84fc7756d8-ljv5b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali92d41ead365", MAC:"d2:ed:c2:e8:71:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:29.691267 env[1054]: 2024-02-09 19:34:29.687 [INFO][4292] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-ljv5b" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--ljv5b-eth0" Feb 9 19:34:29.734544 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec11ee79ed0: link becomes ready Feb 9 19:34:29.734186 systemd-networkd[977]: caliec11ee79ed0: Link UP Feb 9 19:34:29.734418 systemd-networkd[977]: caliec11ee79ed0: Gained carrier Feb 9 19:34:29.750691 env[1054]: time="2024-02-09T19:34:29.750618601Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:29.750899 env[1054]: time="2024-02-09T19:34:29.750872609Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:29.751060 env[1054]: time="2024-02-09T19:34:29.751034843Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:29.751348 env[1054]: time="2024-02-09T19:34:29.751318045Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef pid=4355 runtime=io.containerd.runc.v2 Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.550 [INFO][4305] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0 calico-apiserver-84fc7756d8- calico-apiserver d0b7d3e6-4142-44be-bdda-fe3ebe0a7380 858 0 2024-02-09 19:34:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84fc7756d8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-2-bf9c3542bb.novalocal calico-apiserver-84fc7756d8-hv72s eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliec11ee79ed0 [] []}} ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.550 [INFO][4305] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.611 [INFO][4323] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" HandleID="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.629 [INFO][4323] ipam_plugin.go 268: Auto assigning IP ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" HandleID="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c0a60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-2-bf9c3542bb.novalocal", "pod":"calico-apiserver-84fc7756d8-hv72s", "timestamp":"2024-02-09 19:34:29.611777573 +0000 UTC"}, Hostname:"ci-3510-3-2-2-bf9c3542bb.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.629 [INFO][4323] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.651 [INFO][4323] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.651 [INFO][4323] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-2-bf9c3542bb.novalocal' Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.655 [INFO][4323] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.665 [INFO][4323] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.689 [INFO][4323] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.692 [INFO][4323] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.699 [INFO][4323] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.699 [INFO][4323] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.702 [INFO][4323] ipam.go 1682: Creating new handle: k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256 Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.706 [INFO][4323] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.719 [INFO][4323] ipam.go 1216: Successfully claimed IPs: [192.168.64.198/26] block=192.168.64.192/26 handle="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.719 [INFO][4323] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.198/26] handle="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" host="ci-3510-3-2-2-bf9c3542bb.novalocal" Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.719 [INFO][4323] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:29.754381 env[1054]: 2024-02-09 19:34:29.719 [INFO][4323] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.198/26] IPv6=[] ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" HandleID="k8s-pod-network.be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" Feb 9 19:34:29.755582 env[1054]: 2024-02-09 19:34:29.723 [INFO][4305] k8s.go 385: Populated endpoint ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0", GenerateName:"calico-apiserver-84fc7756d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0b7d3e6-4142-44be-bdda-fe3ebe0a7380", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84fc7756d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"", Pod:"calico-apiserver-84fc7756d8-hv72s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliec11ee79ed0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:29.755582 env[1054]: 2024-02-09 19:34:29.723 [INFO][4305] k8s.go 386: Calico CNI using IPs: [192.168.64.198/32] ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" Feb 9 19:34:29.755582 env[1054]: 2024-02-09 19:34:29.723 [INFO][4305] dataplane_linux.go 68: Setting the host side veth name to caliec11ee79ed0 ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" Feb 9 19:34:29.755582 env[1054]: 2024-02-09 19:34:29.733 [INFO][4305] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" Feb 9 19:34:29.755582 env[1054]: 2024-02-09 19:34:29.741 [INFO][4305] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0", GenerateName:"calico-apiserver-84fc7756d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0b7d3e6-4142-44be-bdda-fe3ebe0a7380", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84fc7756d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256", Pod:"calico-apiserver-84fc7756d8-hv72s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliec11ee79ed0", MAC:"0a:7e:58:1a:16:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:29.755582 env[1054]: 2024-02-09 19:34:29.752 [INFO][4305] k8s.go 491: Wrote updated endpoint to datastore ContainerID="be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256" Namespace="calico-apiserver" Pod="calico-apiserver-84fc7756d8-hv72s" WorkloadEndpoint="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-calico--apiserver--84fc7756d8--hv72s-eth0" Feb 9 19:34:29.782596 systemd[1]: Started cri-containerd-d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef.scope. Feb 9 19:34:29.800954 env[1054]: time="2024-02-09T19:34:29.799510045Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:29.800954 env[1054]: time="2024-02-09T19:34:29.799588061Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:29.800954 env[1054]: time="2024-02-09T19:34:29.799619580Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:29.800954 env[1054]: time="2024-02-09T19:34:29.799739376Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256 pid=4396 runtime=io.containerd.runc.v2 Feb 9 19:34:29.803000 audit[4404]: NETFILTER_CFG table=filter:131 family=2 entries=55 op=nft_register_chain pid=4404 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:29.803000 audit[4404]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffd6e095580 a2=0 a3=7ffd6e09556c items=0 ppid=3120 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.803000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:29.819510 systemd[1]: Started cri-containerd-be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256.scope. Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.824000 audit: BPF prog-id=186 op=LOAD Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4355 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646332376631353463346130646534353139663838666366386630 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4355 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646332376631353463346130646534353139663838666366386630 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.828000 audit: BPF prog-id=187 op=LOAD Feb 9 19:34:29.828000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ce6e0 items=0 ppid=4355 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646332376631353463346130646534353139663838666366386630 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit: BPF prog-id=188 op=LOAD Feb 9 19:34:29.829000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ce728 items=0 ppid=4355 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646332376631353463346130646534353139663838666366386630 Feb 9 19:34:29.829000 audit: BPF prog-id=188 op=UNLOAD Feb 9 19:34:29.829000 audit: BPF prog-id=187 op=UNLOAD Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.829000 audit: BPF prog-id=189 op=LOAD Feb 9 19:34:29.829000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ceb38 items=0 ppid=4355 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646332376631353463346130646534353139663838666366386630 Feb 9 19:34:29.867000 audit[4427]: NETFILTER_CFG table=filter:132 family=2 entries=46 op=nft_register_chain pid=4427 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:29.867000 audit[4427]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7fffed33bb80 a2=0 a3=7fffed33bb6c items=0 ppid=3120 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.867000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.880000 audit: BPF prog-id=190 op=LOAD Feb 9 19:34:29.883000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.883000 audit[4411]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4396 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393234633235303536363431396135386562663137633936396537 Feb 9 19:34:29.885000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.885000 audit[4411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4396 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393234633235303536363431396135386562663137633936396537 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.887000 audit: BPF prog-id=191 op=LOAD Feb 9 19:34:29.887000 audit[4411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001b2240 items=0 ppid=4396 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393234633235303536363431396135386562663137633936396537 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.892000 audit: BPF prog-id=192 op=LOAD Feb 9 19:34:29.892000 audit[4411]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001b2288 items=0 ppid=4396 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393234633235303536363431396135386562663137633936396537 Feb 9 19:34:29.895000 audit: BPF prog-id=192 op=UNLOAD Feb 9 19:34:29.895000 audit: BPF prog-id=191 op=UNLOAD Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { perfmon } for pid=4411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit[4411]: AVC avc: denied { bpf } for pid=4411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:29.896000 audit: BPF prog-id=193 op=LOAD Feb 9 19:34:29.896000 audit[4411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001b2698 items=0 ppid=4396 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393234633235303536363431396135386562663137633936396537 Feb 9 19:34:29.907330 env[1054]: time="2024-02-09T19:34:29.907285820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84fc7756d8-ljv5b,Uid:535d7352-a17f-46c8-9d91-dd084fc3bd55,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef\"" Feb 9 19:34:29.909345 env[1054]: time="2024-02-09T19:34:29.909306425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:34:29.938037 env[1054]: time="2024-02-09T19:34:29.937934380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84fc7756d8-hv72s,Uid:d0b7d3e6-4142-44be-bdda-fe3ebe0a7380,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256\"" Feb 9 19:34:31.263190 systemd-networkd[977]: caliec11ee79ed0: Gained IPv6LL Feb 9 19:34:31.583203 systemd-networkd[977]: cali92d41ead365: Gained IPv6LL Feb 9 19:34:34.546252 env[1054]: time="2024-02-09T19:34:34.544530684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:34.547252 env[1054]: time="2024-02-09T19:34:34.547193394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:34.550470 env[1054]: time="2024-02-09T19:34:34.550384316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:34.553757 env[1054]: time="2024-02-09T19:34:34.553661941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:34.556027 env[1054]: time="2024-02-09T19:34:34.555959576Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:34:34.557086 env[1054]: time="2024-02-09T19:34:34.557035656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:34:34.562514 env[1054]: time="2024-02-09T19:34:34.562449282Z" level=info msg="CreateContainer within sandbox \"d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:34:34.576566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1297434101.mount: Deactivated successfully. Feb 9 19:34:34.592314 env[1054]: time="2024-02-09T19:34:34.592207604Z" level=info msg="CreateContainer within sandbox \"d1dc27f154c4a0de4519f88fcf8f0def2deca8735c011827d02c9250a07063ef\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52\"" Feb 9 19:34:34.595467 env[1054]: time="2024-02-09T19:34:34.595349264Z" level=info msg="StartContainer for \"2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52\"" Feb 9 19:34:34.653527 systemd[1]: Started cri-containerd-2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52.scope. Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.672612 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 19:34:34.673264 kernel: audit: type=1400 audit(1707507274.670:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.683021 kernel: audit: type=1400 audit(1707507274.670:1329): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.683126 kernel: audit: type=1400 audit(1707507274.670:1330): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.686375 kernel: audit: type=1400 audit(1707507274.670:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.687337 kernel: audit: type=1400 audit(1707507274.670:1332): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.693367 kernel: audit: type=1400 audit(1707507274.670:1333): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.698947 kernel: audit: type=1400 audit(1707507274.670:1334): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.708381 kernel: audit: type=1400 audit(1707507274.670:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.708426 kernel: audit: type=1400 audit(1707507274.670:1336): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.711840 kernel: audit: type=1400 audit(1707507274.670:1337): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.670000 audit: BPF prog-id=194 op=LOAD Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4355 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:34.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265396266316365613966363638626466306366376161316662313237 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4355 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:34.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265396266316365613966363638626466306366376161316662313237 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit: BPF prog-id=195 op=LOAD Feb 9 19:34:34.675000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029eda0 items=0 ppid=4355 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:34.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265396266316365613966363638626466306366376161316662313237 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit: BPF prog-id=196 op=LOAD Feb 9 19:34:34.675000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029ede8 items=0 ppid=4355 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:34.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265396266316365613966363638626466306366376161316662313237 Feb 9 19:34:34.675000 audit: BPF prog-id=196 op=UNLOAD Feb 9 19:34:34.675000 audit: BPF prog-id=195 op=UNLOAD Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:34.675000 audit: BPF prog-id=197 op=LOAD Feb 9 19:34:34.675000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029f1f8 items=0 ppid=4355 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:34.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265396266316365613966363638626466306366376161316662313237 Feb 9 19:34:34.747374 env[1054]: time="2024-02-09T19:34:34.747318408Z" level=info msg="StartContainer for \"2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52\" returns successfully" Feb 9 19:34:35.007291 env[1054]: time="2024-02-09T19:34:35.007245953Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:35.009901 env[1054]: time="2024-02-09T19:34:35.009877525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:35.013149 env[1054]: time="2024-02-09T19:34:35.013127328Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:35.017691 env[1054]: time="2024-02-09T19:34:35.017667232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:35.020644 env[1054]: time="2024-02-09T19:34:35.020587035Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:34:35.032858 env[1054]: time="2024-02-09T19:34:35.032795470Z" level=info msg="CreateContainer within sandbox \"be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:34:35.053510 env[1054]: time="2024-02-09T19:34:35.053453763Z" level=info msg="CreateContainer within sandbox \"be924c250566419a58ebf17c969e719a7e18a91c00cef10191745911a7d12256\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3\"" Feb 9 19:34:35.059089 env[1054]: time="2024-02-09T19:34:35.058992303Z" level=info msg="StartContainer for \"5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3\"" Feb 9 19:34:35.091906 systemd[1]: Started cri-containerd-5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3.scope. Feb 9 19:34:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.124000 audit: BPF prog-id=198 op=LOAD Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4396 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561656437616166353366333636613261343166653435653933366631 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4396 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561656437616166353366333636613261343166653435653933366631 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.125000 audit: BPF prog-id=199 op=LOAD Feb 9 19:34:35.125000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000232a70 items=0 ppid=4396 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561656437616166353366333636613261343166653435653933366631 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit: BPF prog-id=200 op=LOAD Feb 9 19:34:35.126000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000232ab8 items=0 ppid=4396 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561656437616166353366333636613261343166653435653933366631 Feb 9 19:34:35.126000 audit: BPF prog-id=200 op=UNLOAD Feb 9 19:34:35.126000 audit: BPF prog-id=199 op=UNLOAD Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:35.126000 audit: BPF prog-id=201 op=LOAD Feb 9 19:34:35.126000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000232ec8 items=0 ppid=4396 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561656437616166353366333636613261343166653435653933366631 Feb 9 19:34:35.442005 env[1054]: time="2024-02-09T19:34:35.441841589Z" level=info msg="StartContainer for \"5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3\" returns successfully" Feb 9 19:34:35.574483 systemd[1]: run-containerd-runc-k8s.io-2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52-runc.HNuYnX.mount: Deactivated successfully. Feb 9 19:34:35.667851 kubelet[1975]: I0209 19:34:35.667800 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84fc7756d8-ljv5b" podStartSLOduration=-9.223372029187021e+09 pod.CreationTimestamp="2024-02-09 19:34:28 +0000 UTC" firstStartedPulling="2024-02-09 19:34:29.909022381 +0000 UTC m=+75.599913463" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:35.647485077 +0000 UTC m=+81.338376159" watchObservedRunningTime="2024-02-09 19:34:35.66775524 +0000 UTC m=+81.358646323" Feb 9 19:34:35.759000 audit[4470]: AVC avc: denied { watch } for pid=4470 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.698016253/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c185,c418 tclass=file permissive=0 Feb 9 19:34:35.759000 audit[4470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e9cfc0 a2=fc6 a3=0 items=0 ppid=4355 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 key=(null) Feb 9 19:34:35.759000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:34:35.777000 audit[4554]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:35.777000 audit[4554]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc12d7e330 a2=0 a3=7ffc12d7e31c items=0 ppid=2176 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:35.780000 audit[4554]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:35.780000 audit[4554]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc12d7e330 a2=0 a3=7ffc12d7e31c items=0 ppid=2176 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:35.854000 audit[4580]: NETFILTER_CFG table=filter:135 family=2 entries=8 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:35.854000 audit[4580]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd32bf1f00 a2=0 a3=7ffd32bf1eec items=0 ppid=2176 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:35.856000 audit[4580]: NETFILTER_CFG table=nat:136 family=2 entries=78 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:35.856000 audit[4580]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd32bf1f00 a2=0 a3=7ffd32bf1eec items=0 ppid=2176 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:35.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:36.645000 audit[4508]: AVC avc: denied { watch } for pid=4508 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.1492066325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c251,c501 tclass=file permissive=0 Feb 9 19:34:36.645000 audit[4508]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b6fb00 a2=fc6 a3=0 items=0 ppid=4396 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 key=(null) Feb 9 19:34:36.645000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:34:46.680485 systemd[1]: Started sshd@7-172.24.4.68:22-172.24.4.1:47700.service. Feb 9 19:34:46.695876 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 19:34:46.696011 kernel: audit: type=1130 audit(1707507286.685:1370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.68:22-172.24.4.1:47700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:46.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.68:22-172.24.4.1:47700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:48.185000 audit[4589]: USER_ACCT pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:48.188961 sshd[4589]: Accepted publickey for core from 172.24.4.1 port 47700 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:48.193940 kernel: audit: type=1101 audit(1707507288.185:1371): pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:48.193000 audit[4589]: CRED_ACQ pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:48.203823 sshd[4589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:48.206425 kernel: audit: type=1103 audit(1707507288.193:1372): pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:48.206488 kernel: audit: type=1006 audit(1707507288.193:1373): pid=4589 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 9 19:34:48.206517 kernel: audit: type=1300 audit(1707507288.193:1373): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50c373a0 a2=3 a3=0 items=0 ppid=1 pid=4589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:48.193000 audit[4589]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50c373a0 a2=3 a3=0 items=0 ppid=1 pid=4589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:48.193000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:34:48.211953 kernel: audit: type=1327 audit(1707507288.193:1373): proctitle=737368643A20636F7265205B707269765D Feb 9 19:34:48.217452 systemd[1]: Started session-8.scope. Feb 9 19:34:48.218557 systemd-logind[1047]: New session 8 of user core. Feb 9 19:34:48.234068 kernel: audit: type=1105 audit(1707507288.223:1374): pid=4589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:48.234188 kernel: audit: type=1103 audit(1707507288.225:1375): pid=4591 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:48.223000 audit[4589]: USER_START pid=4589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:48.225000 audit[4591]: CRED_ACQ pid=4591 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:49.579395 sshd[4589]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:49.580000 audit[4589]: USER_END pid=4589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:49.604977 kernel: audit: type=1106 audit(1707507289.580:1376): pid=4589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:49.612572 kernel: audit: type=1104 audit(1707507289.581:1377): pid=4589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:49.581000 audit[4589]: CRED_DISP pid=4589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:49.605179 systemd[1]: sshd@7-172.24.4.68:22-172.24.4.1:47700.service: Deactivated successfully. Feb 9 19:34:49.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.68:22-172.24.4.1:47700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:49.608383 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:34:49.613315 systemd-logind[1047]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:34:49.614989 systemd-logind[1047]: Removed session 8. Feb 9 19:34:54.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.68:22-172.24.4.1:33734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:54.600146 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:34:54.600294 kernel: audit: type=1130 audit(1707507294.588:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.68:22-172.24.4.1:33734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:54.589290 systemd[1]: Started sshd@8-172.24.4.68:22-172.24.4.1:33734.service. Feb 9 19:34:55.920000 audit[4611]: USER_ACCT pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:55.922185 sshd[4611]: Accepted publickey for core from 172.24.4.1 port 33734 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:55.931989 kernel: audit: type=1101 audit(1707507295.920:1380): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:55.932000 audit[4611]: CRED_ACQ pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:55.934893 sshd[4611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:55.950447 kernel: audit: type=1103 audit(1707507295.932:1381): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:55.950590 kernel: audit: type=1006 audit(1707507295.933:1382): pid=4611 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 9 19:34:55.933000 audit[4611]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1079e1a0 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:55.961342 kernel: audit: type=1300 audit(1707507295.933:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1079e1a0 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:55.971504 kernel: audit: type=1327 audit(1707507295.933:1382): proctitle=737368643A20636F7265205B707269765D Feb 9 19:34:55.933000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:34:55.972819 systemd-logind[1047]: New session 9 of user core. Feb 9 19:34:55.977710 systemd[1]: Started session-9.scope. Feb 9 19:34:55.990000 audit[4611]: USER_START pid=4611 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.005094 kernel: audit: type=1105 audit(1707507295.990:1383): pid=4611 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.004000 audit[4614]: CRED_ACQ pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.011036 kernel: audit: type=1103 audit(1707507296.004:1384): pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.358060 systemd[1]: run-containerd-runc-k8s.io-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca-runc.1t2KFb.mount: Deactivated successfully. Feb 9 19:34:56.816896 sshd[4611]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:56.818000 audit[4611]: USER_END pid=4611 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.833029 kernel: audit: type=1106 audit(1707507296.818:1385): pid=4611 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.818000 audit[4611]: CRED_DISP pid=4611 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.833969 systemd[1]: sshd@8-172.24.4.68:22-172.24.4.1:33734.service: Deactivated successfully. Feb 9 19:34:56.835479 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:34:56.844963 kernel: audit: type=1104 audit(1707507296.818:1386): pid=4611 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:56.846221 systemd-logind[1047]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:34:56.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.68:22-172.24.4.1:33734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:56.849418 systemd-logind[1047]: Removed session 9. Feb 9 19:34:57.184562 systemd[1]: run-containerd-runc-k8s.io-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677-runc.aoXpNh.mount: Deactivated successfully. Feb 9 19:34:59.344821 systemd[1]: run-containerd-runc-k8s.io-5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3-runc.9PiIhf.mount: Deactivated successfully. Feb 9 19:34:59.439945 kubelet[1975]: I0209 19:34:59.439836 1975 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84fc7756d8-hv72s" podStartSLOduration=-9.223372005415054e+09 pod.CreationTimestamp="2024-02-09 19:34:28 +0000 UTC" firstStartedPulling="2024-02-09 19:34:29.943193367 +0000 UTC m=+75.634084459" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:35.672588106 +0000 UTC m=+81.363479198" watchObservedRunningTime="2024-02-09 19:34:59.439720854 +0000 UTC m=+105.130611986" Feb 9 19:34:59.591000 audit[4731]: NETFILTER_CFG table=filter:137 family=2 entries=7 op=nft_register_rule pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.593592 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:34:59.593690 kernel: audit: type=1325 audit(1707507299.591:1388): table=filter:137 family=2 entries=7 op=nft_register_rule pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.591000 audit[4731]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcff4ee5e0 a2=0 a3=7ffcff4ee5cc items=0 ppid=2176 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.604320 kernel: audit: type=1300 audit(1707507299.591:1388): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcff4ee5e0 a2=0 a3=7ffcff4ee5cc items=0 ppid=2176 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.610945 kernel: audit: type=1327 audit(1707507299.591:1388): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.594000 audit[4731]: NETFILTER_CFG table=nat:138 family=2 entries=85 op=nft_register_chain pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.594000 audit[4731]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffcff4ee5e0 a2=0 a3=7ffcff4ee5cc items=0 ppid=2176 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.623091 kernel: audit: type=1325 audit(1707507299.594:1389): table=nat:138 family=2 entries=85 op=nft_register_chain pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.623181 kernel: audit: type=1300 audit(1707507299.594:1389): arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffcff4ee5e0 a2=0 a3=7ffcff4ee5cc items=0 ppid=2176 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.631954 kernel: audit: type=1327 audit(1707507299.594:1389): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.690000 audit[4757]: NETFILTER_CFG table=filter:139 family=2 entries=6 op=nft_register_rule pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.690000 audit[4757]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdff0abf60 a2=0 a3=7ffdff0abf4c items=0 ppid=2176 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.701492 kernel: audit: type=1325 audit(1707507299.690:1390): table=filter:139 family=2 entries=6 op=nft_register_rule pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.701599 kernel: audit: type=1300 audit(1707507299.690:1390): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdff0abf60 a2=0 a3=7ffdff0abf4c items=0 ppid=2176 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.706038 kernel: audit: type=1327 audit(1707507299.690:1390): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.693000 audit[4757]: NETFILTER_CFG table=nat:140 family=2 entries=92 op=nft_register_chain pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.693000 audit[4757]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffdff0abf60 a2=0 a3=7ffdff0abf4c items=0 ppid=2176 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.709936 kernel: audit: type=1325 audit(1707507299.693:1391): table=nat:140 family=2 entries=92 op=nft_register_chain pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:35:01.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.68:22-172.24.4.1:33744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:01.825405 systemd[1]: Started sshd@9-172.24.4.68:22-172.24.4.1:33744.service. Feb 9 19:35:03.184638 sshd[4760]: Accepted publickey for core from 172.24.4.1 port 33744 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:03.183000 audit[4760]: USER_ACCT pid=4760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:03.184000 audit[4760]: CRED_ACQ pid=4760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:03.184000 audit[4760]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb8bea8e0 a2=3 a3=0 items=0 ppid=1 pid=4760 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:03.184000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:03.190482 sshd[4760]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:03.197651 systemd[1]: Started session-10.scope. Feb 9 19:35:03.197837 systemd-logind[1047]: New session 10 of user core. Feb 9 19:35:03.208000 audit[4760]: USER_START pid=4760 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:03.211000 audit[4762]: CRED_ACQ pid=4762 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:04.151093 sshd[4760]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:04.152000 audit[4760]: USER_END pid=4760 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:04.152000 audit[4760]: CRED_DISP pid=4760 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:04.156711 systemd[1]: sshd@9-172.24.4.68:22-172.24.4.1:33744.service: Deactivated successfully. Feb 9 19:35:04.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.68:22-172.24.4.1:33744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:04.158766 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:35:04.161983 systemd-logind[1047]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:35:04.163882 systemd-logind[1047]: Removed session 10. Feb 9 19:35:04.423000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:04.424000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:04.423000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000cb4200 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:35:04.424000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00081c060 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:35:04.424000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:35:04.423000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:35:07.482000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.487479 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 19:35:07.487607 kernel: audit: type=1400 audit(1707507307.482:1403): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.482000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e7df470 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.512664 kernel: audit: type=1300 audit(1707507307.482:1403): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e7df470 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.514736 kernel: audit: type=1327 audit(1707507307.482:1403): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.482000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.534541 kernel: audit: type=1400 audit(1707507307.482:1404): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.534681 kernel: audit: type=1300 audit(1707507307.482:1404): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ee6b980 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.482000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ee6b980 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.554189 kernel: audit: type=1327 audit(1707507307.482:1404): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.554359 kernel: audit: type=1400 audit(1707507307.490:1405): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.490000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.490000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e7df4a0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.565253 kernel: audit: type=1300 audit(1707507307.490:1405): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e7df4a0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.565371 kernel: audit: type=1327 audit(1707507307.490:1405): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.490000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.569900 kernel: audit: type=1400 audit(1707507307.491:1406): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.491000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.491000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0025ff180 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.491000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.534000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.534000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0025daf80 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.534000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:07.535000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:07.535000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ee6bb00 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:35:07.535000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:35:09.160574 systemd[1]: Started sshd@10-172.24.4.68:22-172.24.4.1:42590.service. Feb 9 19:35:09.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.68:22-172.24.4.1:42590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:10.617667 sshd[4776]: Accepted publickey for core from 172.24.4.1 port 42590 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:10.616000 audit[4776]: USER_ACCT pid=4776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:10.619000 audit[4776]: CRED_ACQ pid=4776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:10.619000 audit[4776]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe51d1fd90 a2=3 a3=0 items=0 ppid=1 pid=4776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:10.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:10.627461 sshd[4776]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:10.641269 systemd-logind[1047]: New session 11 of user core. Feb 9 19:35:10.642242 systemd[1]: Started session-11.scope. Feb 9 19:35:10.654000 audit[4776]: USER_START pid=4776 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:10.658000 audit[4780]: CRED_ACQ pid=4780 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:11.469129 sshd[4776]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:11.472000 audit[4776]: USER_END pid=4776 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:11.472000 audit[4776]: CRED_DISP pid=4776 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:11.477651 systemd[1]: Started sshd@11-172.24.4.68:22-172.24.4.1:42600.service. Feb 9 19:35:11.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.68:22-172.24.4.1:42600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:11.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.68:22-172.24.4.1:42590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:11.484464 systemd[1]: sshd@10-172.24.4.68:22-172.24.4.1:42590.service: Deactivated successfully. Feb 9 19:35:11.486442 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:35:11.492623 systemd-logind[1047]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:35:11.496285 systemd-logind[1047]: Removed session 11. Feb 9 19:35:12.899000 audit[4790]: USER_ACCT pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:12.903122 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 19:35:12.903244 kernel: audit: type=1101 audit(1707507312.899:1419): pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:12.903302 sshd[4790]: Accepted publickey for core from 172.24.4.1 port 42600 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:12.913000 audit[4790]: CRED_ACQ pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:12.924739 kernel: audit: type=1103 audit(1707507312.913:1420): pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:12.925024 kernel: audit: type=1006 audit(1707507312.913:1421): pid=4790 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:35:12.926250 sshd[4790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:12.913000 audit[4790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaf922530 a2=3 a3=0 items=0 ppid=1 pid=4790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:12.945992 kernel: audit: type=1300 audit(1707507312.913:1421): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaf922530 a2=3 a3=0 items=0 ppid=1 pid=4790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:12.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:12.951989 kernel: audit: type=1327 audit(1707507312.913:1421): proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:12.960072 systemd-logind[1047]: New session 12 of user core. Feb 9 19:35:12.961320 systemd[1]: Started session-12.scope. Feb 9 19:35:12.975000 audit[4790]: USER_START pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:12.988977 kernel: audit: type=1105 audit(1707507312.975:1422): pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:12.989030 kernel: audit: type=1103 audit(1707507312.979:1423): pid=4812 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:12.979000 audit[4812]: CRED_ACQ pid=4812 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:15.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.68:22-172.24.4.1:43254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:15.447663 systemd[1]: Started sshd@12-172.24.4.68:22-172.24.4.1:43254.service. Feb 9 19:35:15.455543 sshd[4790]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:15.461118 kernel: audit: type=1130 audit(1707507315.447:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.68:22-172.24.4.1:43254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:15.465000 audit[4790]: USER_END pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:15.482034 kernel: audit: type=1106 audit(1707507315.465:1425): pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:15.482192 kernel: audit: type=1104 audit(1707507315.466:1426): pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:15.466000 audit[4790]: CRED_DISP pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:15.508127 systemd[1]: sshd@11-172.24.4.68:22-172.24.4.1:42600.service: Deactivated successfully. Feb 9 19:35:15.510334 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:35:15.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.68:22-172.24.4.1:42600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:15.514173 systemd-logind[1047]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:35:15.518761 systemd-logind[1047]: Removed session 12. Feb 9 19:35:16.733000 audit[4822]: USER_ACCT pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:16.735120 sshd[4822]: Accepted publickey for core from 172.24.4.1 port 43254 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:16.735000 audit[4822]: CRED_ACQ pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:16.735000 audit[4822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffddfc1090 a2=3 a3=0 items=0 ppid=1 pid=4822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:16.735000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:16.739098 sshd[4822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:16.753149 systemd-logind[1047]: New session 13 of user core. Feb 9 19:35:16.753350 systemd[1]: Started session-13.scope. Feb 9 19:35:16.769000 audit[4822]: USER_START pid=4822 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:16.773000 audit[4825]: CRED_ACQ pid=4825 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:16.887813 env[1054]: time="2024-02-09T19:35:16.887713709Z" level=info msg="StopPodSandbox for \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\"" Feb 9 19:35:17.667387 sshd[4822]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:17.679000 audit[4822]: USER_END pid=4822 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:17.679000 audit[4822]: CRED_DISP pid=4822 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:17.683390 systemd[1]: sshd@12-172.24.4.68:22-172.24.4.1:43254.service: Deactivated successfully. Feb 9 19:35:17.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.68:22-172.24.4.1:43254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:17.685573 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:35:17.687475 systemd-logind[1047]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:35:17.690286 systemd-logind[1047]: Removed session 13. Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.376 [WARNING][4839] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9f8d9fa7-839c-4971-b751-a94db83544a4", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d", Pod:"csi-node-driver-2fh9p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia1839f304a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.379 [INFO][4839] k8s.go 578: Cleaning up netns ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.379 [INFO][4839] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" iface="eth0" netns="" Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.379 [INFO][4839] k8s.go 585: Releasing IP address(es) ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.379 [INFO][4839] utils.go 188: Calico CNI releasing IP address ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.617 [INFO][4852] ipam_plugin.go 415: Releasing address using handleID ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.624 [INFO][4852] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.624 [INFO][4852] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.673 [WARNING][4852] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.673 [INFO][4852] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.684 [INFO][4852] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:35:17.698375 env[1054]: 2024-02-09 19:35:17.694 [INFO][4839] k8s.go 591: Teardown processing complete. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.698375 env[1054]: time="2024-02-09T19:35:17.698340013Z" level=info msg="TearDown network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\" successfully" Feb 9 19:35:17.699744 env[1054]: time="2024-02-09T19:35:17.698477801Z" level=info msg="StopPodSandbox for \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\" returns successfully" Feb 9 19:35:17.699834 env[1054]: time="2024-02-09T19:35:17.699739670Z" level=info msg="RemovePodSandbox for \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\"" Feb 9 19:35:17.700024 env[1054]: time="2024-02-09T19:35:17.699803861Z" level=info msg="Forcibly stopping sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\"" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.772 [WARNING][4873] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9f8d9fa7-839c-4971-b751-a94db83544a4", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-2-bf9c3542bb.novalocal", ContainerID:"7f314fa1627b3d77eb6bdbcea02ae38421c324633453e172ff5af5ade96e218d", Pod:"csi-node-driver-2fh9p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia1839f304a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.772 [INFO][4873] k8s.go 578: Cleaning up netns ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.772 [INFO][4873] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" iface="eth0" netns="" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.772 [INFO][4873] k8s.go 585: Releasing IP address(es) ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.772 [INFO][4873] utils.go 188: Calico CNI releasing IP address ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.817 [INFO][4880] ipam_plugin.go 415: Releasing address using handleID ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.817 [INFO][4880] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.817 [INFO][4880] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.827 [WARNING][4880] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.827 [INFO][4880] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" HandleID="k8s-pod-network.8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Workload="ci--3510--3--2--2--bf9c3542bb.novalocal-k8s-csi--node--driver--2fh9p-eth0" Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.828 [INFO][4880] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:35:17.832800 env[1054]: 2024-02-09 19:35:17.830 [INFO][4873] k8s.go 591: Teardown processing complete. ContainerID="8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a" Feb 9 19:35:17.834132 env[1054]: time="2024-02-09T19:35:17.832825587Z" level=info msg="TearDown network for sandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\" successfully" Feb 9 19:35:17.839062 env[1054]: time="2024-02-09T19:35:17.838995267Z" level=info msg="RemovePodSandbox \"8353c7511b1fb4d9f8c64e96cc96e4e290204a595b3d5d13877639b3c2219d2a\" returns successfully" Feb 9 19:35:22.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.68:22-172.24.4.1:43268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:22.667658 systemd[1]: Started sshd@13-172.24.4.68:22-172.24.4.1:43268.service. Feb 9 19:35:22.671568 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 9 19:35:22.671667 kernel: audit: type=1130 audit(1707507322.667:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.68:22-172.24.4.1:43268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:24.070000 audit[4887]: USER_ACCT pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:24.071398 sshd[4887]: Accepted publickey for core from 172.24.4.1 port 43268 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:24.071000 audit[4887]: CRED_ACQ pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:24.082367 sshd[4887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:24.099830 kernel: audit: type=1101 audit(1707507324.070:1437): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:24.100006 kernel: audit: type=1103 audit(1707507324.071:1438): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:24.107992 kernel: audit: type=1006 audit(1707507324.071:1439): pid=4887 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 19:35:24.071000 audit[4887]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4f4489f0 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:24.113614 systemd-logind[1047]: New session 14 of user core. Feb 9 19:35:24.115627 systemd[1]: Started session-14.scope. Feb 9 19:35:24.123980 kernel: audit: type=1300 audit(1707507324.071:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4f4489f0 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:24.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:24.129992 kernel: audit: type=1327 audit(1707507324.071:1439): proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:24.138000 audit[4887]: USER_START pid=4887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:24.151040 kernel: audit: type=1105 audit(1707507324.138:1440): pid=4887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:24.151173 kernel: audit: type=1103 audit(1707507324.141:1441): pid=4890 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:24.141000 audit[4890]: CRED_ACQ pid=4890 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:25.018364 sshd[4887]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:25.019000 audit[4887]: USER_END pid=4887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:25.023577 systemd[1]: sshd@13-172.24.4.68:22-172.24.4.1:43268.service: Deactivated successfully. Feb 9 19:35:25.029955 systemd-logind[1047]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:35:25.037123 kernel: audit: type=1106 audit(1707507325.019:1442): pid=4887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:25.037261 kernel: audit: type=1104 audit(1707507325.020:1443): pid=4887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:25.020000 audit[4887]: CRED_DISP pid=4887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:25.035553 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:35:25.039429 systemd-logind[1047]: Removed session 14. Feb 9 19:35:25.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.68:22-172.24.4.1:43268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:25.644000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:25.644000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e5f940 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:35:25.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:35:25.648000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:25.648000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e5f9a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:35:25.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:35:25.657000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:25.657000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e5fea0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:35:25.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:35:25.657000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:35:25.657000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e5fee0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:35:25.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:35:26.346588 systemd[1]: run-containerd-runc-k8s.io-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca-runc.DO62q2.mount: Deactivated successfully. Feb 9 19:35:27.191765 systemd[1]: run-containerd-runc-k8s.io-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677-runc.9CqmSM.mount: Deactivated successfully. Feb 9 19:35:29.364479 systemd[1]: run-containerd-runc-k8s.io-2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52-runc.XZifIJ.mount: Deactivated successfully. Feb 9 19:35:29.375511 systemd[1]: run-containerd-runc-k8s.io-5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3-runc.AcTa6V.mount: Deactivated successfully. Feb 9 19:35:30.028389 systemd[1]: Started sshd@14-172.24.4.68:22-172.24.4.1:57508.service. Feb 9 19:35:30.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.68:22-172.24.4.1:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:30.032477 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:35:30.032615 kernel: audit: type=1130 audit(1707507330.028:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.68:22-172.24.4.1:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:31.426683 sshd[4980]: Accepted publickey for core from 172.24.4.1 port 57508 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:31.425000 audit[4980]: USER_ACCT pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:31.444003 kernel: audit: type=1101 audit(1707507331.425:1450): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:31.454704 kernel: audit: type=1103 audit(1707507331.443:1451): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:31.443000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:31.455820 sshd[4980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:31.462034 kernel: audit: type=1006 audit(1707507331.443:1452): pid=4980 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 19:35:31.462276 kernel: audit: type=1300 audit(1707507331.443:1452): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4119edd0 a2=3 a3=0 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:31.443000 audit[4980]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4119edd0 a2=3 a3=0 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:31.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:31.479014 kernel: audit: type=1327 audit(1707507331.443:1452): proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:31.490304 systemd-logind[1047]: New session 15 of user core. Feb 9 19:35:31.491543 systemd[1]: Started session-15.scope. Feb 9 19:35:31.504000 audit[4980]: USER_START pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:31.519040 kernel: audit: type=1105 audit(1707507331.504:1453): pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:31.519000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:31.531034 kernel: audit: type=1103 audit(1707507331.519:1454): pid=4988 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:32.177060 sshd[4980]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:32.178000 audit[4980]: USER_END pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:32.183761 systemd-logind[1047]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:35:32.185369 systemd[1]: sshd@14-172.24.4.68:22-172.24.4.1:57508.service: Deactivated successfully. Feb 9 19:35:32.186869 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:35:32.189515 systemd-logind[1047]: Removed session 15. Feb 9 19:35:32.178000 audit[4980]: CRED_DISP pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:32.202198 kernel: audit: type=1106 audit(1707507332.178:1455): pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:32.202351 kernel: audit: type=1104 audit(1707507332.178:1456): pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:32.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.68:22-172.24.4.1:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:35.761000 audit[4470]: AVC avc: denied { watch } for pid=4470 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.698016253/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c185,c418 tclass=file permissive=0 Feb 9 19:35:35.765501 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:35:35.765674 kernel: audit: type=1400 audit(1707507335.761:1458): avc: denied { watch } for pid=4470 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.698016253/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c185,c418 tclass=file permissive=0 Feb 9 19:35:35.761000 audit[4470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a00480 a2=fc6 a3=0 items=0 ppid=4355 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 key=(null) Feb 9 19:35:35.789811 kernel: audit: type=1300 audit(1707507335.761:1458): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a00480 a2=fc6 a3=0 items=0 ppid=4355 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 key=(null) Feb 9 19:35:35.790104 kernel: audit: type=1327 audit(1707507335.761:1458): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:35:35.761000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:35:36.655000 audit[4508]: AVC avc: denied { watch } for pid=4508 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.1492066325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c251,c501 tclass=file permissive=0 Feb 9 19:35:36.655000 audit[4508]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001246340 a2=fc6 a3=0 items=0 ppid=4396 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 key=(null) Feb 9 19:35:36.687035 kernel: audit: type=1400 audit(1707507336.655:1459): avc: denied { watch } for pid=4508 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.1492066325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c251,c501 tclass=file permissive=0 Feb 9 19:35:36.687225 kernel: audit: type=1300 audit(1707507336.655:1459): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001246340 a2=fc6 a3=0 items=0 ppid=4396 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 key=(null) Feb 9 19:35:36.687287 kernel: audit: type=1327 audit(1707507336.655:1459): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:35:36.655000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:35:37.199103 kernel: audit: type=1130 audit(1707507337.186:1460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.68:22-172.24.4.1:55674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:37.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.68:22-172.24.4.1:55674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:37.187252 systemd[1]: Started sshd@15-172.24.4.68:22-172.24.4.1:55674.service. Feb 9 19:35:38.830000 audit[4999]: USER_ACCT pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:38.833948 sshd[4999]: Accepted publickey for core from 172.24.4.1 port 55674 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:38.842961 kernel: audit: type=1101 audit(1707507338.830:1461): pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:38.842000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:38.853981 kernel: audit: type=1103 audit(1707507338.842:1462): pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:38.854509 sshd[4999]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:38.864979 kernel: audit: type=1006 audit(1707507338.842:1463): pid=4999 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:35:38.842000 audit[4999]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff25c763a0 a2=3 a3=0 items=0 ppid=1 pid=4999 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:38.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:38.871012 systemd-logind[1047]: New session 16 of user core. Feb 9 19:35:38.873641 systemd[1]: Started session-16.scope. Feb 9 19:35:38.882000 audit[4999]: USER_START pid=4999 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:38.884000 audit[5001]: CRED_ACQ pid=5001 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:39.725114 sshd[4999]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:39.726000 audit[4999]: USER_END pid=4999 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:39.726000 audit[4999]: CRED_DISP pid=4999 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:39.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.68:22-172.24.4.1:55674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:39.730532 systemd[1]: sshd@15-172.24.4.68:22-172.24.4.1:55674.service: Deactivated successfully. Feb 9 19:35:39.732430 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:35:39.734572 systemd-logind[1047]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:35:39.738171 systemd-logind[1047]: Removed session 16. Feb 9 19:35:44.736981 systemd[1]: Started sshd@16-172.24.4.68:22-172.24.4.1:35046.service. Feb 9 19:35:44.750542 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:35:44.750719 kernel: audit: type=1130 audit(1707507344.737:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.68:22-172.24.4.1:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:44.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.68:22-172.24.4.1:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:46.221981 kernel: audit: type=1101 audit(1707507346.207:1470): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:46.207000 audit[5022]: USER_ACCT pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:46.221000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:46.235116 kernel: audit: type=1103 audit(1707507346.221:1471): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:46.235219 sshd[5022]: Accepted publickey for core from 172.24.4.1 port 35046 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:46.223452 sshd[5022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:46.241989 kernel: audit: type=1006 audit(1707507346.221:1472): pid=5022 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:35:46.221000 audit[5022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9c536ef0 a2=3 a3=0 items=0 ppid=1 pid=5022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:46.221000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:46.259160 kernel: audit: type=1300 audit(1707507346.221:1472): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9c536ef0 a2=3 a3=0 items=0 ppid=1 pid=5022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:46.259315 kernel: audit: type=1327 audit(1707507346.221:1472): proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:46.268063 systemd-logind[1047]: New session 17 of user core. Feb 9 19:35:46.271626 systemd[1]: Started session-17.scope. Feb 9 19:35:46.282000 audit[5022]: USER_START pid=5022 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:46.290591 kernel: audit: type=1105 audit(1707507346.282:1473): pid=5022 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:46.291563 kernel: audit: type=1103 audit(1707507346.289:1474): pid=5025 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:46.289000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:47.088281 sshd[5022]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:47.089000 audit[5022]: USER_END pid=5022 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:47.104859 systemd[1]: sshd@16-172.24.4.68:22-172.24.4.1:35046.service: Deactivated successfully. Feb 9 19:35:47.105164 kernel: audit: type=1106 audit(1707507347.089:1475): pid=5022 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:47.108073 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:35:47.089000 audit[5022]: CRED_DISP pid=5022 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:47.109894 systemd-logind[1047]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:35:47.120034 kernel: audit: type=1104 audit(1707507347.089:1476): pid=5022 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:47.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.68:22-172.24.4.1:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:47.121042 systemd-logind[1047]: Removed session 17. Feb 9 19:35:52.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.68:22-172.24.4.1:35062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:52.100746 systemd[1]: Started sshd@17-172.24.4.68:22-172.24.4.1:35062.service. Feb 9 19:35:52.104864 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:35:52.105048 kernel: audit: type=1130 audit(1707507352.100:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.68:22-172.24.4.1:35062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:53.400000 audit[5037]: USER_ACCT pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:53.401679 sshd[5037]: Accepted publickey for core from 172.24.4.1 port 35062 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:35:53.406000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:53.415229 sshd[5037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:35:53.423572 kernel: audit: type=1101 audit(1707507353.400:1479): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:53.423754 kernel: audit: type=1103 audit(1707507353.406:1480): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:53.406000 audit[5037]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc76c4b7a0 a2=3 a3=0 items=0 ppid=1 pid=5037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:53.436811 systemd[1]: Started session-18.scope. Feb 9 19:35:53.439067 systemd-logind[1047]: New session 18 of user core. Feb 9 19:35:53.443895 kernel: audit: type=1006 audit(1707507353.406:1481): pid=5037 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 19:35:53.444059 kernel: audit: type=1300 audit(1707507353.406:1481): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc76c4b7a0 a2=3 a3=0 items=0 ppid=1 pid=5037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:53.444119 kernel: audit: type=1327 audit(1707507353.406:1481): proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:53.406000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:35:53.455000 audit[5037]: USER_START pid=5037 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:53.478140 kernel: audit: type=1105 audit(1707507353.455:1482): pid=5037 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:53.477000 audit[5039]: CRED_ACQ pid=5039 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:53.489073 kernel: audit: type=1103 audit(1707507353.477:1483): pid=5039 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:54.189275 sshd[5037]: pam_unix(sshd:session): session closed for user core Feb 9 19:35:54.190000 audit[5037]: USER_END pid=5037 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:54.190000 audit[5037]: CRED_DISP pid=5037 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:54.213418 kernel: audit: type=1106 audit(1707507354.190:1484): pid=5037 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:54.213566 kernel: audit: type=1104 audit(1707507354.190:1485): pid=5037 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:35:54.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.68:22-172.24.4.1:35062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:54.214512 systemd[1]: sshd@17-172.24.4.68:22-172.24.4.1:35062.service: Deactivated successfully. Feb 9 19:35:54.216304 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:35:54.217786 systemd-logind[1047]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:35:54.219768 systemd-logind[1047]: Removed session 18. Feb 9 19:35:56.349776 systemd[1]: run-containerd-runc-k8s.io-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca-runc.g7dVPq.mount: Deactivated successfully. Feb 9 19:35:57.199087 systemd[1]: run-containerd-runc-k8s.io-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677-runc.ojd7Hu.mount: Deactivated successfully. Feb 9 19:35:59.199468 systemd[1]: Started sshd@18-172.24.4.68:22-172.24.4.1:57492.service. Feb 9 19:35:59.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.68:22-172.24.4.1:57492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:59.204206 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:35:59.204357 kernel: audit: type=1130 audit(1707507359.199:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.68:22-172.24.4.1:57492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:35:59.339188 systemd[1]: run-containerd-runc-k8s.io-2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52-runc.DIMZCr.mount: Deactivated successfully. Feb 9 19:35:59.349672 systemd[1]: run-containerd-runc-k8s.io-5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3-runc.yRBw3S.mount: Deactivated successfully. Feb 9 19:36:00.732000 audit[5095]: USER_ACCT pid=5095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:00.736100 sshd[5095]: Accepted publickey for core from 172.24.4.1 port 57492 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:00.744982 kernel: audit: type=1101 audit(1707507360.732:1488): pid=5095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:00.743000 audit[5095]: CRED_ACQ pid=5095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:00.747971 sshd[5095]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:00.756282 kernel: audit: type=1103 audit(1707507360.743:1489): pid=5095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:00.756409 kernel: audit: type=1006 audit(1707507360.744:1490): pid=5095 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 19:36:00.744000 audit[5095]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff468b7e00 a2=3 a3=0 items=0 ppid=1 pid=5095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:00.777985 kernel: audit: type=1300 audit(1707507360.744:1490): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff468b7e00 a2=3 a3=0 items=0 ppid=1 pid=5095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:00.778174 kernel: audit: type=1327 audit(1707507360.744:1490): proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:00.744000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:00.785956 systemd[1]: Started session-19.scope. Feb 9 19:36:00.790057 systemd-logind[1047]: New session 19 of user core. Feb 9 19:36:00.802000 audit[5095]: USER_START pid=5095 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:00.815997 kernel: audit: type=1105 audit(1707507360.802:1491): pid=5095 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:00.805000 audit[5136]: CRED_ACQ pid=5136 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:00.827064 kernel: audit: type=1103 audit(1707507360.805:1492): pid=5136 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:02.063410 sshd[5095]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:02.064000 audit[5095]: USER_END pid=5095 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:02.065000 audit[5095]: CRED_DISP pid=5095 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:02.079621 systemd[1]: sshd@18-172.24.4.68:22-172.24.4.1:57492.service: Deactivated successfully. Feb 9 19:36:02.082751 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:36:02.085250 systemd-logind[1047]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:36:02.088294 kernel: audit: type=1106 audit(1707507362.064:1493): pid=5095 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:02.088420 kernel: audit: type=1104 audit(1707507362.065:1494): pid=5095 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:02.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.68:22-172.24.4.1:57492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:02.087778 systemd-logind[1047]: Removed session 19. Feb 9 19:36:04.428000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:04.431558 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:36:04.431680 kernel: audit: type=1400 audit(1707507364.428:1496): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:04.435000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:04.453960 kernel: audit: type=1400 audit(1707507364.435:1497): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:04.435000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0028c8740 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:04.435000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:04.480865 kernel: audit: type=1300 audit(1707507364.435:1497): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0028c8740 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:04.481070 kernel: audit: type=1327 audit(1707507364.435:1497): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:04.481163 kernel: audit: type=1300 audit(1707507364.428:1496): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002adc120 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:04.428000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002adc120 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:04.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:04.499675 kernel: audit: type=1327 audit(1707507364.428:1496): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:07.073058 systemd[1]: Started sshd@19-172.24.4.68:22-172.24.4.1:48448.service. Feb 9 19:36:07.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.68:22-172.24.4.1:48448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:07.083995 kernel: audit: type=1130 audit(1707507367.072:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.68:22-172.24.4.1:48448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:07.493000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.507008 kernel: audit: type=1400 audit(1707507367.493:1499): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.508245 kernel: audit: type=1400 audit(1707507367.493:1500): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.493000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.493000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01c7986f0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:36:07.530608 kernel: audit: type=1300 audit(1707507367.493:1500): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01c7986f0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:36:07.493000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:36:07.493000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00af83240 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:36:07.493000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:36:07.495000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.495000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01c726150 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:36:07.495000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:36:07.499000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.499000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01c798840 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:36:07.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:36:07.535000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.535000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00aea2ee0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:36:07.535000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:36:07.536000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:07.536000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01c726330 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:36:07.536000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:36:08.472000 audit[5146]: USER_ACCT pid=5146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:08.474094 sshd[5146]: Accepted publickey for core from 172.24.4.1 port 48448 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:08.474000 audit[5146]: CRED_ACQ pid=5146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:08.474000 audit[5146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf6d8dd40 a2=3 a3=0 items=0 ppid=1 pid=5146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:08.474000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:08.476716 sshd[5146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:08.488050 systemd-logind[1047]: New session 20 of user core. Feb 9 19:36:08.488446 systemd[1]: Started session-20.scope. Feb 9 19:36:08.501000 audit[5146]: USER_START pid=5146 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:08.504000 audit[5148]: CRED_ACQ pid=5148 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:09.274568 sshd[5146]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:09.276000 audit[5146]: USER_END pid=5146 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:09.276000 audit[5146]: CRED_DISP pid=5146 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:09.280333 systemd[1]: sshd@19-172.24.4.68:22-172.24.4.1:48448.service: Deactivated successfully. Feb 9 19:36:09.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.68:22-172.24.4.1:48448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:09.282220 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:36:09.284204 systemd-logind[1047]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:36:09.287670 systemd-logind[1047]: Removed session 20. Feb 9 19:36:11.633871 systemd[1]: run-containerd-runc-k8s.io-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677-runc.fcclhs.mount: Deactivated successfully. Feb 9 19:36:14.288525 systemd[1]: Started sshd@20-172.24.4.68:22-172.24.4.1:48452.service. Feb 9 19:36:14.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.68:22-172.24.4.1:48452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:14.292836 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:36:14.293049 kernel: audit: type=1130 audit(1707507374.288:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.68:22-172.24.4.1:48452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:15.710000 audit[5178]: USER_ACCT pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:15.713217 sshd[5178]: Accepted publickey for core from 172.24.4.1 port 48452 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:15.722021 kernel: audit: type=1101 audit(1707507375.710:1514): pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:15.721000 audit[5178]: CRED_ACQ pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:15.723855 sshd[5178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:15.740040 kernel: audit: type=1103 audit(1707507375.721:1515): pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:15.740218 kernel: audit: type=1006 audit(1707507375.721:1516): pid=5178 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 19:36:15.721000 audit[5178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb51e9c10 a2=3 a3=0 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:15.751123 kernel: audit: type=1300 audit(1707507375.721:1516): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb51e9c10 a2=3 a3=0 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:15.753989 kernel: audit: type=1327 audit(1707507375.721:1516): proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:15.721000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:15.760857 systemd-logind[1047]: New session 21 of user core. Feb 9 19:36:15.762551 systemd[1]: Started session-21.scope. Feb 9 19:36:15.774000 audit[5178]: USER_START pid=5178 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:15.777000 audit[5182]: CRED_ACQ pid=5182 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:15.797387 kernel: audit: type=1105 audit(1707507375.774:1517): pid=5178 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:15.797514 kernel: audit: type=1103 audit(1707507375.777:1518): pid=5182 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:16.850076 sshd[5178]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:16.851000 audit[5178]: USER_END pid=5178 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:16.852000 audit[5178]: CRED_DISP pid=5178 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:16.865877 systemd[1]: sshd@20-172.24.4.68:22-172.24.4.1:48452.service: Deactivated successfully. Feb 9 19:36:16.867480 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:36:16.874981 kernel: audit: type=1106 audit(1707507376.851:1519): pid=5178 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:16.876048 kernel: audit: type=1104 audit(1707507376.852:1520): pid=5178 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:16.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.68:22-172.24.4.1:48452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.876400 systemd-logind[1047]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:36:16.878556 systemd-logind[1047]: Removed session 21. Feb 9 19:36:21.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.68:22-172.24.4.1:50332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:21.861110 systemd[1]: Started sshd@21-172.24.4.68:22-172.24.4.1:50332.service. Feb 9 19:36:21.864887 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:36:21.865019 kernel: audit: type=1130 audit(1707507381.860:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.68:22-172.24.4.1:50332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:23.382000 audit[5192]: USER_ACCT pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:23.394500 sshd[5192]: Accepted publickey for core from 172.24.4.1 port 50332 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:23.395796 kernel: audit: type=1101 audit(1707507383.382:1523): pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:23.393000 audit[5192]: CRED_ACQ pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:23.397015 sshd[5192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:23.407124 kernel: audit: type=1103 audit(1707507383.393:1524): pid=5192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:23.413965 kernel: audit: type=1006 audit(1707507383.393:1525): pid=5192 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 19:36:23.393000 audit[5192]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe202a5b40 a2=3 a3=0 items=0 ppid=1 pid=5192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:23.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:23.431244 kernel: audit: type=1300 audit(1707507383.393:1525): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe202a5b40 a2=3 a3=0 items=0 ppid=1 pid=5192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:23.431406 kernel: audit: type=1327 audit(1707507383.393:1525): proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:23.434886 systemd-logind[1047]: New session 22 of user core. Feb 9 19:36:23.435616 systemd[1]: Started session-22.scope. Feb 9 19:36:23.448000 audit[5192]: USER_START pid=5192 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:23.462850 kernel: audit: type=1105 audit(1707507383.448:1526): pid=5192 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:23.462000 audit[5198]: CRED_ACQ pid=5198 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:23.473064 kernel: audit: type=1103 audit(1707507383.462:1527): pid=5198 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:24.340550 sshd[5192]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:24.341000 audit[5192]: USER_END pid=5192 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:24.354980 kernel: audit: type=1106 audit(1707507384.341:1528): pid=5192 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:24.356089 systemd[1]: sshd@21-172.24.4.68:22-172.24.4.1:50332.service: Deactivated successfully. Feb 9 19:36:24.357789 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:36:24.341000 audit[5192]: CRED_DISP pid=5192 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:24.361008 systemd-logind[1047]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:36:24.363472 systemd-logind[1047]: Removed session 22. Feb 9 19:36:24.378010 kernel: audit: type=1104 audit(1707507384.341:1529): pid=5192 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:24.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.68:22-172.24.4.1:50332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:25.649000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:25.649000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028c8700 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:25.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:25.649000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:25.649000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0028c8720 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:25.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:25.658000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:25.658000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b8f4e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:25.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:25.658000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:36:25.658000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0028c8840 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:36:25.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:36:26.356602 systemd[1]: run-containerd-runc-k8s.io-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca-runc.2VQTt6.mount: Deactivated successfully. Feb 9 19:36:27.185666 systemd[1]: run-containerd-runc-k8s.io-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677-runc.6kxTG3.mount: Deactivated successfully. Feb 9 19:36:29.358287 systemd[1]: run-containerd-runc-k8s.io-5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3-runc.EyPSvu.mount: Deactivated successfully. Feb 9 19:36:29.369975 systemd[1]: run-containerd-runc-k8s.io-2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52-runc.XVjSMc.mount: Deactivated successfully. Feb 9 19:36:29.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.68:22-172.24.4.1:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:29.379661 systemd[1]: Started sshd@22-172.24.4.68:22-172.24.4.1:36884.service. Feb 9 19:36:29.381025 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:36:29.381081 kernel: audit: type=1130 audit(1707507389.378:1535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.68:22-172.24.4.1:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:30.601609 sshd[5269]: Accepted publickey for core from 172.24.4.1 port 36884 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:30.600000 audit[5269]: USER_ACCT pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:30.601000 audit[5269]: CRED_ACQ pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:30.614706 sshd[5269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:30.623241 kernel: audit: type=1101 audit(1707507390.600:1536): pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:30.623416 kernel: audit: type=1103 audit(1707507390.601:1537): pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:30.623772 kernel: audit: type=1006 audit(1707507390.601:1538): pid=5269 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 19:36:30.601000 audit[5269]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcf021400 a2=3 a3=0 items=0 ppid=1 pid=5269 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:30.641194 kernel: audit: type=1300 audit(1707507390.601:1538): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcf021400 a2=3 a3=0 items=0 ppid=1 pid=5269 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:30.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:30.645629 kernel: audit: type=1327 audit(1707507390.601:1538): proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:30.652467 systemd[1]: Started session-23.scope. Feb 9 19:36:30.653454 systemd-logind[1047]: New session 23 of user core. Feb 9 19:36:30.664000 audit[5269]: USER_START pid=5269 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:30.677000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:30.688242 kernel: audit: type=1105 audit(1707507390.664:1539): pid=5269 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:30.688391 kernel: audit: type=1103 audit(1707507390.677:1540): pid=5289 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:31.589014 sshd[5269]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:31.590000 audit[5269]: USER_END pid=5269 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:31.590000 audit[5269]: CRED_DISP pid=5269 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:31.607484 kernel: audit: type=1106 audit(1707507391.590:1541): pid=5269 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:31.607654 kernel: audit: type=1104 audit(1707507391.590:1542): pid=5269 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:31.607851 systemd[1]: sshd@22-172.24.4.68:22-172.24.4.1:36884.service: Deactivated successfully. Feb 9 19:36:31.608865 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:36:31.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.68:22-172.24.4.1:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:31.610613 systemd-logind[1047]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:36:31.611900 systemd-logind[1047]: Removed session 23. Feb 9 19:36:35.768530 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:36:35.769047 kernel: audit: type=1400 audit(1707507395.764:1544): avc: denied { watch } for pid=4470 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.698016253/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c185,c418 tclass=file permissive=0 Feb 9 19:36:35.764000 audit[4470]: AVC avc: denied { watch } for pid=4470 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.698016253/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c185,c418 tclass=file permissive=0 Feb 9 19:36:35.764000 audit[4470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019ee700 a2=fc6 a3=0 items=0 ppid=4355 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 key=(null) Feb 9 19:36:35.796035 kernel: audit: type=1300 audit(1707507395.764:1544): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019ee700 a2=fc6 a3=0 items=0 ppid=4355 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c418 key=(null) Feb 9 19:36:35.796218 kernel: audit: type=1327 audit(1707507395.764:1544): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:36:35.764000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:36:36.600631 systemd[1]: Started sshd@23-172.24.4.68:22-172.24.4.1:48526.service. Feb 9 19:36:36.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.68:22-172.24.4.1:48526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:36.612991 kernel: audit: type=1130 audit(1707507396.600:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.68:22-172.24.4.1:48526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:36.659000 audit[4508]: AVC avc: denied { watch } for pid=4508 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.1492066325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c251,c501 tclass=file permissive=0 Feb 9 19:36:36.672078 kernel: audit: type=1400 audit(1707507396.659:1546): avc: denied { watch } for pid=4508 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_29.1492066325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c251,c501 tclass=file permissive=0 Feb 9 19:36:36.659000 audit[4508]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00151c6a0 a2=fc6 a3=0 items=0 ppid=4396 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 key=(null) Feb 9 19:36:36.659000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:36:36.691397 kernel: audit: type=1300 audit(1707507396.659:1546): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00151c6a0 a2=fc6 a3=0 items=0 ppid=4396 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c501 key=(null) Feb 9 19:36:36.691551 kernel: audit: type=1327 audit(1707507396.659:1546): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:36:37.958000 audit[5299]: USER_ACCT pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:37.961539 sshd[5299]: Accepted publickey for core from 172.24.4.1 port 48526 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:37.970997 kernel: audit: type=1101 audit(1707507397.958:1547): pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:37.969000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:37.982189 kernel: audit: type=1103 audit(1707507397.969:1548): pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:37.971892 sshd[5299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:37.991351 kernel: audit: type=1006 audit(1707507397.970:1549): pid=5299 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:36:37.970000 audit[5299]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff83ca91d0 a2=3 a3=0 items=0 ppid=1 pid=5299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:37.970000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:37.997042 systemd-logind[1047]: New session 24 of user core. Feb 9 19:36:37.999984 systemd[1]: Started session-24.scope. Feb 9 19:36:38.012000 audit[5299]: USER_START pid=5299 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:38.016000 audit[5302]: CRED_ACQ pid=5302 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:38.954087 sshd[5299]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:38.956000 audit[5299]: USER_END pid=5299 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:38.957000 audit[5299]: CRED_DISP pid=5299 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:38.962465 systemd[1]: sshd@23-172.24.4.68:22-172.24.4.1:48526.service: Deactivated successfully. Feb 9 19:36:38.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.68:22-172.24.4.1:48526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.965632 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:36:38.972076 systemd-logind[1047]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:36:38.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.68:22-172.24.4.1:48536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.975654 systemd[1]: Started sshd@24-172.24.4.68:22-172.24.4.1:48536.service. Feb 9 19:36:38.979715 systemd-logind[1047]: Removed session 24. Feb 9 19:36:40.540000 audit[5312]: USER_ACCT pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:40.541995 sshd[5312]: Accepted publickey for core from 172.24.4.1 port 48536 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:40.542000 audit[5312]: CRED_ACQ pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:40.542000 audit[5312]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff001bb0d0 a2=3 a3=0 items=0 ppid=1 pid=5312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:40.542000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:40.544675 sshd[5312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:40.559377 systemd-logind[1047]: New session 25 of user core. Feb 9 19:36:40.563030 systemd[1]: Started session-25.scope. Feb 9 19:36:40.574000 audit[5312]: USER_START pid=5312 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:40.578000 audit[5314]: CRED_ACQ pid=5314 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:41.958230 systemd[1]: Started sshd@25-172.24.4.68:22-172.24.4.1:48538.service. Feb 9 19:36:41.968701 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 9 19:36:41.968881 kernel: audit: type=1130 audit(1707507401.961:1561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.68:22-172.24.4.1:48538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:41.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.68:22-172.24.4.1:48538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:41.962679 sshd[5312]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:41.976000 audit[5312]: USER_END pid=5312 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:41.985325 systemd[1]: sshd@24-172.24.4.68:22-172.24.4.1:48536.service: Deactivated successfully. Feb 9 19:36:41.988321 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:36:41.991992 kernel: audit: type=1106 audit(1707507401.976:1562): pid=5312 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:41.976000 audit[5312]: CRED_DISP pid=5312 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:41.993415 systemd-logind[1047]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:36:41.996094 systemd-logind[1047]: Removed session 25. Feb 9 19:36:41.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.68:22-172.24.4.1:48536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:42.012645 kernel: audit: type=1104 audit(1707507401.976:1563): pid=5312 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:42.012989 kernel: audit: type=1131 audit(1707507401.982:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.68:22-172.24.4.1:48536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.725355 sshd[5320]: Accepted publickey for core from 172.24.4.1 port 48538 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:43.724000 audit[5320]: USER_ACCT pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:43.736990 kernel: audit: type=1101 audit(1707507403.724:1565): pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:43.736000 audit[5320]: CRED_ACQ pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:43.747982 sshd[5320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:43.753943 kernel: audit: type=1103 audit(1707507403.736:1566): pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:43.754081 kernel: audit: type=1006 audit(1707507403.736:1567): pid=5320 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:36:43.736000 audit[5320]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe80181430 a2=3 a3=0 items=0 ppid=1 pid=5320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:43.767966 kernel: audit: type=1300 audit(1707507403.736:1567): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe80181430 a2=3 a3=0 items=0 ppid=1 pid=5320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:43.736000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:43.775206 kernel: audit: type=1327 audit(1707507403.736:1567): proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:43.781535 systemd-logind[1047]: New session 26 of user core. Feb 9 19:36:43.782889 systemd[1]: Started session-26.scope. Feb 9 19:36:43.803000 audit[5320]: USER_START pid=5320 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:43.816755 kernel: audit: type=1105 audit(1707507403.803:1568): pid=5320 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:43.815000 audit[5323]: CRED_ACQ pid=5323 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:45.975000 audit[5358]: NETFILTER_CFG table=filter:141 family=2 entries=18 op=nft_register_rule pid=5358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.975000 audit[5358]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd48358240 a2=0 a3=7ffd4835822c items=0 ppid=2176 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.978000 audit[5358]: NETFILTER_CFG table=nat:142 family=2 entries=94 op=nft_register_rule pid=5358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.978000 audit[5358]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffd48358240 a2=0 a3=7ffd4835822c items=0 ppid=2176 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:46.029000 audit[5384]: NETFILTER_CFG table=filter:143 family=2 entries=30 op=nft_register_rule pid=5384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:46.029000 audit[5384]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe5f34ca20 a2=0 a3=7ffe5f34ca0c items=0 ppid=2176 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:46.031000 audit[5384]: NETFILTER_CFG table=nat:144 family=2 entries=94 op=nft_register_rule pid=5384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:46.031000 audit[5384]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe5f34ca20 a2=0 a3=7ffe5f34ca0c items=0 ppid=2176 pid=5384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:46.148294 sshd[5320]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:46.155000 audit[5320]: USER_END pid=5320 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:46.155000 audit[5320]: CRED_DISP pid=5320 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:46.160702 systemd[1]: Started sshd@26-172.24.4.68:22-172.24.4.1:33918.service. Feb 9 19:36:46.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.68:22-172.24.4.1:33918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:46.168577 systemd[1]: sshd@25-172.24.4.68:22-172.24.4.1:48538.service: Deactivated successfully. Feb 9 19:36:46.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.68:22-172.24.4.1:48538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:46.170758 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:36:46.175763 systemd-logind[1047]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:36:46.178482 systemd-logind[1047]: Removed session 26. Feb 9 19:36:47.641000 audit[5386]: USER_ACCT pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:47.647304 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 19:36:47.647445 kernel: audit: type=1101 audit(1707507407.641:1578): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:47.647524 sshd[5386]: Accepted publickey for core from 172.24.4.1 port 33918 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:47.645000 audit[5386]: CRED_ACQ pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:47.658540 sshd[5386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:47.670197 kernel: audit: type=1103 audit(1707507407.645:1579): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:47.671054 kernel: audit: type=1006 audit(1707507407.645:1580): pid=5386 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:36:47.680462 kernel: audit: type=1300 audit(1707507407.645:1580): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1da60c60 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:47.645000 audit[5386]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1da60c60 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:47.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:47.700070 kernel: audit: type=1327 audit(1707507407.645:1580): proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:47.712090 systemd-logind[1047]: New session 27 of user core. Feb 9 19:36:47.714647 systemd[1]: Started session-27.scope. Feb 9 19:36:47.733000 audit[5386]: USER_START pid=5386 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:47.746164 kernel: audit: type=1105 audit(1707507407.733:1581): pid=5386 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:47.745000 audit[5390]: CRED_ACQ pid=5390 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:47.751948 kernel: audit: type=1103 audit(1707507407.745:1582): pid=5390 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:49.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.68:22-172.24.4.1:33924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:49.928377 sshd[5386]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:49.929119 kernel: audit: type=1130 audit(1707507409.923:1583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.68:22-172.24.4.1:33924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:49.923878 systemd[1]: Started sshd@27-172.24.4.68:22-172.24.4.1:33924.service. Feb 9 19:36:49.934000 audit[5386]: USER_END pid=5386 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:49.948358 kernel: audit: type=1106 audit(1707507409.934:1584): pid=5386 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:49.948498 kernel: audit: type=1104 audit(1707507409.935:1585): pid=5386 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:49.935000 audit[5386]: CRED_DISP pid=5386 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:49.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.68:22-172.24.4.1:33918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:49.962265 systemd[1]: sshd@26-172.24.4.68:22-172.24.4.1:33918.service: Deactivated successfully. Feb 9 19:36:49.964297 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:36:49.966204 systemd-logind[1047]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:36:49.969432 systemd-logind[1047]: Removed session 27. Feb 9 19:36:51.874000 audit[5398]: USER_ACCT pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:51.877331 sshd[5398]: Accepted publickey for core from 172.24.4.1 port 33924 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:51.878000 audit[5398]: CRED_ACQ pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:51.879000 audit[5398]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeac87f6f0 a2=3 a3=0 items=0 ppid=1 pid=5398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:51.879000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:51.886873 sshd[5398]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:51.898763 systemd-logind[1047]: New session 28 of user core. Feb 9 19:36:51.901158 systemd[1]: Started session-28.scope. Feb 9 19:36:51.907000 audit[5398]: USER_START pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:51.910000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:52.723180 sshd[5398]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:52.724000 audit[5398]: USER_END pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:52.728607 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 9 19:36:52.729842 kernel: audit: type=1106 audit(1707507412.724:1592): pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:52.741639 systemd[1]: sshd@27-172.24.4.68:22-172.24.4.1:33924.service: Deactivated successfully. Feb 9 19:36:52.743886 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 19:36:52.725000 audit[5398]: CRED_DISP pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:52.755004 kernel: audit: type=1104 audit(1707507412.725:1593): pid=5398 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:52.757440 systemd-logind[1047]: Session 28 logged out. Waiting for processes to exit. Feb 9 19:36:52.761409 systemd-logind[1047]: Removed session 28. Feb 9 19:36:52.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.68:22-172.24.4.1:33924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:52.783240 kernel: audit: type=1131 audit(1707507412.741:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.68:22-172.24.4.1:33924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:56.140000 audit[5441]: NETFILTER_CFG table=filter:145 family=2 entries=18 op=nft_register_rule pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:56.140000 audit[5441]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcab7f1340 a2=0 a3=7ffcab7f132c items=0 ppid=2176 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:56.149839 kernel: audit: type=1325 audit(1707507416.140:1595): table=filter:145 family=2 entries=18 op=nft_register_rule pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:56.150007 kernel: audit: type=1300 audit(1707507416.140:1595): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcab7f1340 a2=0 a3=7ffcab7f132c items=0 ppid=2176 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:56.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:56.152960 kernel: audit: type=1327 audit(1707507416.140:1595): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:56.162000 audit[5441]: NETFILTER_CFG table=nat:146 family=2 entries=178 op=nft_register_chain pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:56.162000 audit[5441]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffcab7f1340 a2=0 a3=7ffcab7f132c items=0 ppid=2176 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:56.178970 kernel: audit: type=1325 audit(1707507416.162:1596): table=nat:146 family=2 entries=178 op=nft_register_chain pid=5441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:56.179127 kernel: audit: type=1300 audit(1707507416.162:1596): arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffcab7f1340 a2=0 a3=7ffcab7f132c items=0 ppid=2176 pid=5441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:56.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:56.186138 kernel: audit: type=1327 audit(1707507416.162:1596): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:56.376111 systemd[1]: run-containerd-runc-k8s.io-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca-runc.2Rl1yX.mount: Deactivated successfully. Feb 9 19:36:57.192867 systemd[1]: run-containerd-runc-k8s.io-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677-runc.RffzlK.mount: Deactivated successfully. Feb 9 19:36:57.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.24.4.68:22-172.24.4.1:57182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:57.732444 systemd[1]: Started sshd@28-172.24.4.68:22-172.24.4.1:57182.service. Feb 9 19:36:57.743009 kernel: audit: type=1130 audit(1707507417.731:1597): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.24.4.68:22-172.24.4.1:57182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:59.106000 audit[5485]: USER_ACCT pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.107829 sshd[5485]: Accepted publickey for core from 172.24.4.1 port 57182 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:36:59.113985 kernel: audit: type=1101 audit(1707507419.106:1598): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.114000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.116256 sshd[5485]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:59.122984 kernel: audit: type=1103 audit(1707507419.114:1599): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.123137 kernel: audit: type=1006 audit(1707507419.114:1600): pid=5485 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 19:36:59.131537 kernel: audit: type=1300 audit(1707507419.114:1600): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe59de9010 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:59.114000 audit[5485]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe59de9010 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:59.137279 kernel: audit: type=1327 audit(1707507419.114:1600): proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:59.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:36:59.144776 systemd-logind[1047]: New session 29 of user core. Feb 9 19:36:59.145704 systemd[1]: Started session-29.scope. Feb 9 19:36:59.153000 audit[5485]: USER_START pid=5485 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.168353 kernel: audit: type=1105 audit(1707507419.153:1601): pid=5485 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.168456 kernel: audit: type=1103 audit(1707507419.154:1602): pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.154000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.338168 systemd[1]: run-containerd-runc-k8s.io-2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52-runc.ncW1W9.mount: Deactivated successfully. Feb 9 19:36:59.361363 systemd[1]: run-containerd-runc-k8s.io-5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3-runc.dZ68Il.mount: Deactivated successfully. Feb 9 19:36:59.818982 sshd[5485]: pam_unix(sshd:session): session closed for user core Feb 9 19:36:59.819000 audit[5485]: USER_END pid=5485 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.832007 kernel: audit: type=1106 audit(1707507419.819:1603): pid=5485 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.819000 audit[5485]: CRED_DISP pid=5485 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.832767 systemd[1]: sshd@28-172.24.4.68:22-172.24.4.1:57182.service: Deactivated successfully. Feb 9 19:36:59.834389 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 19:36:59.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.24.4.68:22-172.24.4.1:57182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:59.838051 kernel: audit: type=1104 audit(1707507419.819:1604): pid=5485 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:36:59.838754 systemd-logind[1047]: Session 29 logged out. Waiting for processes to exit. Feb 9 19:36:59.841151 systemd-logind[1047]: Removed session 29. Feb 9 19:37:04.437000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:04.440337 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:37:04.440461 kernel: audit: type=1400 audit(1707507424.437:1606): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:04.437000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:04.437000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0012bc660 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:04.472628 kernel: audit: type=1400 audit(1707507424.437:1607): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:04.472796 kernel: audit: type=1300 audit(1707507424.437:1607): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0012bc660 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:04.472859 kernel: audit: type=1327 audit(1707507424.437:1607): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:04.437000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:04.437000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002237ee0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:04.495089 kernel: audit: type=1300 audit(1707507424.437:1606): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002237ee0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:04.495215 kernel: audit: type=1327 audit(1707507424.437:1606): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:04.437000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:04.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.24.4.68:22-172.24.4.1:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:04.833456 systemd[1]: Started sshd@29-172.24.4.68:22-172.24.4.1:50930.service. Feb 9 19:37:04.846983 kernel: audit: type=1130 audit(1707507424.833:1608): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.24.4.68:22-172.24.4.1:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:07.028000 audit[5538]: USER_ACCT pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.107975 kernel: audit: type=1101 audit(1707507427.028:1609): pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.108198 kernel: audit: type=1103 audit(1707507427.040:1610): pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.108270 kernel: audit: type=1006 audit(1707507427.040:1611): pid=5538 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 9 19:37:07.040000 audit[5538]: CRED_ACQ pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.040000 audit[5538]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb3f44670 a2=3 a3=0 items=0 ppid=1 pid=5538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:07.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:07.081000 audit[5538]: USER_START pid=5538 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.084000 audit[5541]: CRED_ACQ pid=5541 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.109085 sshd[5538]: Accepted publickey for core from 172.24.4.1 port 50930 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:37:07.068596 systemd-logind[1047]: New session 30 of user core. Feb 9 19:37:07.042372 sshd[5538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:07.069218 systemd[1]: Started session-30.scope. Feb 9 19:37:07.499000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:07.499000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0090a8d50 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:37:07.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:37:07.500000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:07.500000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0090a8d80 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:37:07.500000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:37:07.512000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:07.512000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00906e4e0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:37:07.512000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:37:07.513000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:07.513000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c002942d40 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:37:07.513000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:37:07.536000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:07.536000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:07.536000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0090a8f90 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:37:07.536000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:37:07.536000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0029430a0 a2=fc6 a3=0 items=0 ppid=1693 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c971 key=(null) Feb 9 19:37:07.536000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:37:07.935138 sshd[5538]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:07.936000 audit[5538]: USER_END pid=5538 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.937000 audit[5538]: CRED_DISP pid=5538 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:07.941120 systemd[1]: sshd@29-172.24.4.68:22-172.24.4.1:50930.service: Deactivated successfully. Feb 9 19:37:07.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.24.4.68:22-172.24.4.1:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:07.944800 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 19:37:07.948083 systemd-logind[1047]: Session 30 logged out. Waiting for processes to exit. Feb 9 19:37:07.949969 systemd-logind[1047]: Removed session 30. Feb 9 19:37:12.943880 systemd[1]: Started sshd@30-172.24.4.68:22-172.24.4.1:50942.service. Feb 9 19:37:12.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.24.4.68:22-172.24.4.1:50942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:12.950956 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:37:12.951097 kernel: audit: type=1130 audit(1707507432.943:1623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.24.4.68:22-172.24.4.1:50942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:14.434000 audit[5574]: USER_ACCT pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:14.437220 sshd[5574]: Accepted publickey for core from 172.24.4.1 port 50942 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:37:14.450006 kernel: audit: type=1101 audit(1707507434.434:1624): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:14.448000 audit[5574]: CRED_ACQ pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:14.451246 sshd[5574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:14.460990 kernel: audit: type=1103 audit(1707507434.448:1625): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:14.448000 audit[5574]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd3e4a0e0 a2=3 a3=0 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:14.479904 kernel: audit: type=1006 audit(1707507434.448:1626): pid=5574 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 9 19:37:14.480067 kernel: audit: type=1300 audit(1707507434.448:1626): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd3e4a0e0 a2=3 a3=0 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:14.448000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:14.484999 kernel: audit: type=1327 audit(1707507434.448:1626): proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:14.492582 systemd-logind[1047]: New session 31 of user core. Feb 9 19:37:14.493556 systemd[1]: Started session-31.scope. Feb 9 19:37:14.505000 audit[5574]: USER_START pid=5574 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:14.519987 kernel: audit: type=1105 audit(1707507434.505:1627): pid=5574 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:14.506000 audit[5576]: CRED_ACQ pid=5576 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:14.530088 kernel: audit: type=1103 audit(1707507434.506:1628): pid=5576 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:15.241299 sshd[5574]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:15.241000 audit[5574]: USER_END pid=5574 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:15.242000 audit[5574]: CRED_DISP pid=5574 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:15.246751 systemd[1]: sshd@30-172.24.4.68:22-172.24.4.1:50942.service: Deactivated successfully. Feb 9 19:37:15.248302 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 19:37:15.251818 systemd-logind[1047]: Session 31 logged out. Waiting for processes to exit. Feb 9 19:37:15.253451 kernel: audit: type=1106 audit(1707507435.241:1629): pid=5574 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:15.253561 kernel: audit: type=1104 audit(1707507435.242:1630): pid=5574 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:15.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.24.4.68:22-172.24.4.1:50942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:15.254296 systemd-logind[1047]: Removed session 31. Feb 9 19:37:20.253008 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:37:20.253232 kernel: audit: type=1130 audit(1707507440.248:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.24.4.68:22-172.24.4.1:36786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.24.4.68:22-172.24.4.1:36786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.249405 systemd[1]: Started sshd@31-172.24.4.68:22-172.24.4.1:36786.service. Feb 9 19:37:21.527441 sshd[5600]: Accepted publickey for core from 172.24.4.1 port 36786 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:37:21.526000 audit[5600]: USER_ACCT pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:21.538023 kernel: audit: type=1101 audit(1707507441.526:1633): pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:21.537000 audit[5600]: CRED_ACQ pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:21.538967 sshd[5600]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:21.556307 kernel: audit: type=1103 audit(1707507441.537:1634): pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:21.556464 kernel: audit: type=1006 audit(1707507441.537:1635): pid=5600 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 9 19:37:21.537000 audit[5600]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe083f6fc0 a2=3 a3=0 items=0 ppid=1 pid=5600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.569373 kernel: audit: type=1300 audit(1707507441.537:1635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe083f6fc0 a2=3 a3=0 items=0 ppid=1 pid=5600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.537000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:21.572947 kernel: audit: type=1327 audit(1707507441.537:1635): proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:21.581191 systemd-logind[1047]: New session 32 of user core. Feb 9 19:37:21.584125 systemd[1]: Started session-32.scope. Feb 9 19:37:21.597000 audit[5600]: USER_START pid=5600 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:21.614708 kernel: audit: type=1105 audit(1707507441.597:1636): pid=5600 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:21.614868 kernel: audit: type=1103 audit(1707507441.613:1637): pid=5602 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:21.613000 audit[5602]: CRED_ACQ pid=5602 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:22.222366 sshd[5600]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:22.224000 audit[5600]: USER_END pid=5600 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:22.224000 audit[5600]: CRED_DISP pid=5600 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:22.247495 systemd[1]: sshd@31-172.24.4.68:22-172.24.4.1:36786.service: Deactivated successfully. Feb 9 19:37:22.249126 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 19:37:22.256966 kernel: audit: type=1106 audit(1707507442.224:1638): pid=5600 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:22.257132 kernel: audit: type=1104 audit(1707507442.224:1639): pid=5600 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:22.257125 systemd-logind[1047]: Session 32 logged out. Waiting for processes to exit. Feb 9 19:37:22.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.24.4.68:22-172.24.4.1:36786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:22.259514 systemd-logind[1047]: Removed session 32. Feb 9 19:37:25.652000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.656559 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:37:25.656745 kernel: audit: type=1400 audit(1707507445.652:1641): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.652000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024846e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:25.679761 kernel: audit: type=1300 audit(1707507445.652:1641): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024846e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:25.679977 kernel: audit: type=1327 audit(1707507445.652:1641): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:25.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:25.652000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.701080 kernel: audit: type=1400 audit(1707507445.652:1642): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.701234 kernel: audit: type=1300 audit(1707507445.652:1642): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00266a7e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:25.652000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00266a7e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:25.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:25.725264 kernel: audit: type=1327 audit(1707507445.652:1642): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:25.725414 kernel: audit: type=1400 audit(1707507445.659:1643): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.659000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.732619 kernel: audit: type=1300 audit(1707507445.659:1643): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266a800 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:25.659000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266a800 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:25.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:25.743449 kernel: audit: type=1327 audit(1707507445.659:1643): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:25.744478 kernel: audit: type=1400 audit(1707507445.663:1644): avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.663000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524801 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:37:25.663000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266a920 a2=fc6 a3=0 items=0 ppid=1737 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c917 key=(null) Feb 9 19:37:25.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:37:26.343892 systemd[1]: run-containerd-runc-k8s.io-7e7b5cad98c40fa96e7fd9223d0393be30693e675c5c88b4cd0a22f4adf79eca-runc.YBHIxO.mount: Deactivated successfully. Feb 9 19:37:27.186629 systemd[1]: run-containerd-runc-k8s.io-9de0d2f882fb30b97d9079b219a9008d94e7ef14a227e8f0d8f3b8a03eebd677-runc.ld7YYP.mount: Deactivated successfully. Feb 9 19:37:27.233881 systemd[1]: Started sshd@32-172.24.4.68:22-172.24.4.1:38662.service. Feb 9 19:37:27.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.24.4.68:22-172.24.4.1:38662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.671014 sshd[5650]: Accepted publickey for core from 172.24.4.1 port 38662 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:37:28.669000 audit[5650]: USER_ACCT pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:28.672000 audit[5650]: CRED_ACQ pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:28.674000 audit[5650]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc148afb70 a2=3 a3=0 items=0 ppid=1 pid=5650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:28.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:28.677142 sshd[5650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:28.689675 systemd-logind[1047]: New session 33 of user core. Feb 9 19:37:28.690704 systemd[1]: Started session-33.scope. Feb 9 19:37:28.703000 audit[5650]: USER_START pid=5650 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:28.707000 audit[5656]: CRED_ACQ pid=5656 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:29.336745 systemd[1]: run-containerd-runc-k8s.io-2e9bf1cea9f668bdf0cf7aa1fb12729fb8b688006844f8fb1fa20e05fec53b52-runc.Dd7rl4.mount: Deactivated successfully. Feb 9 19:37:29.368258 systemd[1]: run-containerd-runc-k8s.io-5aed7aaf53f366a2a41fe45e936f1e36baa3dd9ff264fc132fc5a8d65878eae3-runc.7mc666.mount: Deactivated successfully. Feb 9 19:37:29.463761 sshd[5650]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:29.465000 audit[5650]: USER_END pid=5650 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:29.466000 audit[5650]: CRED_DISP pid=5650 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:37:29.470456 systemd[1]: sshd@32-172.24.4.68:22-172.24.4.1:38662.service: Deactivated successfully. Feb 9 19:37:29.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.24.4.68:22-172.24.4.1:38662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:29.472616 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 19:37:29.474335 systemd-logind[1047]: Session 33 logged out. Waiting for processes to exit. Feb 9 19:37:29.478618 systemd-logind[1047]: Removed session 33.